Department of Computer Science and Technology

Technical reports

No Title Authors Date Notes Download
992 Transient execution vulnerabilities in the security context of server hardware Allison Randal 2023-12 PhD
145 p
PDF (1.5 MB)
991 Porting a mix network client to mobile Jacky W. E. Kung 2023-12 BA
57 p
PDF (5.0 MB)
990 Probing the foundations of neural algorithmic reasoning Euan Ong 2023-12 BA
75 p
PDF (5.0 MB)
989 Balanced allocations under incomplete information: New settings and techniques Dimitrios Los 2023-11 PhD
230 p
PDF (3.4 MB)
988 CHERI C semantics as an extension of the ISO C17 standard Vadim Zaliva, Kayvan Memarian, et al. 2023-10 11 p PDF (0.3 MB)
987 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 9) Robert N. M. Watson, Peter G. Neumann, et al. 2023-09 523 p PDF (2.8 MB)
986 Early performance results from the prototype Morello microarchitecture Robert N. M. Watson, Jessica Clarke, et al. 2023-09 19 p PDF (0.9 MB)
985 Scalable agent-based models for optimized policy design: applications to the economics of biodiversity and carbon Sharan S. Agrawal 2023-08 MPhil
84 p
PDF (4.8 MB)
984 Efficient spatial and temporal safety for microcontrollers and application-class processors Peter David Rugg 2023-07 PhD
189 p
PDF (2.7 MB)
983 An evaluation of police interventions for cybercrime prevention Maria Bada, Alice Hutchings, et al. 2023-07 80 p PDF (2.0 MB)
982 Arm Morello Programme: Architectural security goals and known limitations Robert N. M. Watson, Graeme Barnes, et al. 2023-07 8 p PDF (0.2 MB)
981 The Cerberus C semantics Kayvan Memarian 2023-05 PhD
290 p
PDF (3.6 MB)
980 Protecting enclaves from side-channel attacks through physical isolation Marno van der Maas 2023-03 PhD
120 p
PDF (1.5 MB)
979 Efficient virtual cache coherency for multicore systems and accelerators Xuan Guo 2023-02 PhD
202 p
PDF (3.3 MB)
978 A Next Generation Internet Architecture Alexander G. Fraser 2023-02 118 p PDF (1.4 MB)
977 Motion quality models for real-time adaptive rendering Akshay Jindal 2023-01 PhD
132 p
colour
PDF (14.4 MB)
976 CHERI compartmentalisation for embedded systems Hesham Almatary 2022-11 PhD
142 p
PDF (1.6 MB)
975 Memory safety with CHERI capabilities: security analysis, language interpreters, and heap temporal safety Brett Gutstein 2022-11 PhD
119 p
PDF (1.2 MB)
974 Dynamic analysis for concurrency optimisation Indigo J. D. Orton 2022-08 PhD
166 p
PDF (1.7 MB)
973 Data-driven representations in brain science: modelling approaches in gene expression and neuroimaging domains Tiago M. L. Azevedo 2022-07 PhD
136 p
colour
PDF (5.9 MB)
972 Muntjac multicore RV64 processor: introduction and microarchitectural guide Xuan Guo, Daniel Bates, et al. 2022-06 27 p PDF (1.8 MB)
971 Automating representation change across domains for reasoning Aaron Stockdill 2022-06 PhD
268 p
PDF (3.9 MB)
970 Transparent analysis of multi-modal embeddings Anita L. Verő 2022-05 PhD
202 p
colour
PDF (61.6 MB)
969 Assessing the understandability of a distributed algorithm by tweeting buggy pseudocode Martin Kleppmann 2022-05 15 p PDF (0.5 MB)
968 Evidence-based verification and correction of textual claims James Thorne 2022-02 PhD
231 p
PDF (3.7 MB)
967 Gaussian Pixie Autoencoder: Introducing Functional Distributional Semantics to continuous latent spaces Primož Fabiani 2022-01 MPhil
50 p
PDF (0.7 MB)
966 Obstacles to wearable computing Helen Oliver 2021-12 PhD
318 p
PDF (14.3 MB)
965 Improving commercial LiFi network feasibility through rotation invariance, motion prediction, and bandwidth aggregation at the physical layer Daniel M. Fisher, Jon A. Crowcroft 2021-11 MPhil
79 p
PDF (2.8 MB)
964 Information dissemination via random walks Hayk Saribekyan 2021-11 PhD
134 p
PDF (2.6 MB)
963 Capability-based access control for cyber physical systems Michael G. Dodson 2021-10 PhD
127 p
PDF (3.2 MB)
962 Trusted reference monitors for Linux using Intel SGX enclaves Harri Bell-Thomas 2021-10 MEng
62 p
PDF (2.9 MB)
961 CheriOS: designing an untrusted single-address-space capability operating system utilising capability hardware and a minimal hypervisor Lawrence G. Esswood 2021-09 PhD
195 p
PDF (1.5 MB)
960 Data summarizations for scalable, robust and privacy-aware learning in high dimensions Dionysis Manousakas 2021-09 PhD
130 p
PDF (16.0 MB)
959 Verified security for the Morello capability-enhanced prototype Arm architecture Thomas Bauereiss, Brian Campbell, et al. 2021-09 24 p PDF (0.9 MB)
958 Machine-learning approaches for the empirical Schrödinger bridge problem Francisco Vargas 2021-06 MPhil
114 p
PDF (5.2 MB)
957 Rollercoaster: an efficient group-multicast scheme for mix networks Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford (2021) 27 p PDF (2.0 MB)
956 Optimisation of a modern numerical library: a bottom-up approach Jianxin Zhao 2021-04 PhD
96 p
PDF (4.0 MB)
955 Capability memory protection for embedded systems Hongyan Xia 2021-02 PhD
145 p
PDF (1.5 MB)
954 Inline and sideline approaches for low-cost memory safety in C Myoung Jin Nam 2021-02 PhD
124 p
PDF (1.5 MB)
953 DSbD CHERI and Morello Capability Essential IP (Version 1) Robert N. M. Watson, Jonathan Woodruff, et al. 2020-12 25 p PDF (0.4 MB)
952 Exploring the effect of spatial faithfulness on group decision-making David Adeboye 2020-10 MPhil
64 p
PDF (2.5 MB)
951 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 8) Robert N. M. Watson, Peter G. Neumann, et al. 2020-10 590 p PDF (3.3 MB)
950 Probabilistic concurrent game semantics Hugo Paquet 2020-08 PhD
156 p
PDF (1.4 MB)
949 Complete spatial safety for C and C++ using CHERI capabilities Alexander Richardson 2020-06 PhD
189 p
PDF (3.1 MB)
948 Reasoning about effectful programs and evaluation order Dylan McDermott 2020-06 PhD
150 p
PDF (1.4 MB)
947 CHERI C/C++ Programming Guide Robert N. M. Watson, Alexander Richardson, et al. 2020-06 33 p PDF (0.5 MB)
946 End-to-end deep reinforcement learning in computer systems Michael Schaarschmidt 2020-04 PhD
166 p
PDF (3.2 MB)
945 Machine learning methods for detecting structure in metabolic flow networks Maxwell Jay Conway 2020-03 PhD
132 p
PDF (2.7 MB)
944 Honeypots in the age of universal attacks and the Internet of Things Alexander Vetterl 2020-02 PhD
115 p
PDF (2.6 MB)
943 Latency-First datacenter network scheduling Mathew P. Grosvenor 2020-01 PhD
310 p
PDF (10.3 MB)
942 Evaluating visually grounded language capabilities using microworlds Alexander Kuhnle 2020-01 PhD
142 p
PDF (4.1 MB)
941 An Introduction to CHERI Robert N. M. Watson, Simon W. Moore, et al. 2019-09 43 p PDF (0.6 MB)
940 Rigorous engineering for hardware security: formal modelling and proof in the CHERI design and implementation process Kyndylan Nienhuis, Alexandre Joannou, et al. 2019-09 38 p PDF (0.7 MB)
939 Effects of timing on users’ perceived control when interacting with intelligent systems Christine Guo Yu 2019-08 PhD
284 p
PDF (6.3 MB)
938 Automatic annotation of error types for grammatical error correction Christopher Bryant 2019-06 PhD
138 p
PDF (3.8 MB)
937 Latency-driven performance in data centres Diana Andreea Popescu 2019-06 PhD
190 p
PDF (21.5 MB)
936 High-performance memory safety: optimizing the CHERI capability machine Alexandre J. P. Joannou 2019-05 PhD
132 p
PDF (3.4 MB)
935 Distributed consensus revised Heidi Howard 2019-04 PhD
151 p
PDF (1.2 MB)
934 Exploitation from malicious PCI Express peripherals Colin L. Rothwell 2019-02 108 p PDF (4.9 MB)
933 An Evaluation of NDP performance Noa Zilberman 2019-01 19 p PDF (2.8 MB)
932 CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment Brooks Davis, Robert N. M. Watson, et al. 2019-04 40 p PDF (0.5 MB)
931 A Performance-efficient and practical processor error recovery framework Jyothish Soman 2019-01 PhD
91 p
PDF (1.7 MB)
930 Provenance-based computing Lucian Carata 2018-12 PhD
132 p
PDF (5.5 MB)
929 Resilient payment systems Khaled Baqer 2018-11 PhD
115 p
PDF (4.6 MB)
928 Cut-through network switches: architecture, design and implementation Noa Zilberman, Łukasz Dudziak, et al. 2018-11 18 p PDF (0.6 MB)
927 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 7) Robert N. M. Watson, Peter G. Neumann, et al. 2019-06 496 p PDF (10.5 MB)
926 Are cyber-blackouts in service networks likely?: implications for cyber risk management Ranjan Pal, Konstantinos Psounis, et al. 2018-10 32 p PDF (1.9 MB)
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
923 Prefetching for complex memory access patterns Sam Ainsworth 2018-07 PhD
146 p
PDF (3.5 MB)
922 Raising a new generation of cyber defenders Frank Stajano, Graham Rymer, Michelle Houghton 2018-06 307 p PDF (68.6 MB)
921 Optimising data centre operation by removing the transport bottleneck Toby Moncaster 2018-06 PhD
130 p
PDF (8.0 MB)
920 Interactive analytical modelling Advait Sarkar 2018-05 PhD
142 p
colour
PDF (9.7 MB)
919 Proceedings of the 2017 Scheme and Functional Programming Workshop Nada Amin, François-René Rideau 2018-03 50 p PDF (2.8 MB)
918 Evaluation of decentralized email architecture and social network analysis based on email attachment sharing Gregory Y. Tsipenyuk 2018-03 PhD
153 p
PDF (2.7 MB)
917 Formal verification-driven parallelisation synthesis Matko Botinčan 2018-03 PhD
163 p
PDF (2.0 MB)
916 Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks Robert N. M. Watson, Jonathan Woodruff, et al. 2018-02 16 p PDF (0.2 MB)
915 Annotating errors and disfluencies in transcriptions of speech Andrew Caines, Diane Nicholls, Paula Buttery 2017-12 10 p PDF (0.4 MB)
914 Characterizing the impact of network latency on cloud-based applications’ performance Diana Andreea Popescu, Noa Zilberman, Andrew W. Moore 2017-11 20 p PDF (0.8 MB)
913 Hierarchical statistical semantic translation and realization Matic Horvat 2017-10 PhD
215 p
PDF (5.8 MB)
912 Network traffic classification via neural networks Ang Kun Joo Michael, Emma Valla, et al. 2017-09 25 p PDF (0.8 MB)
911 Proofs for ‘Verifying Spatial Properties of Array Computations’ Dominic Orchard, Mistral Contrastin, et al. 2017-09 8 p PDF (0.5 MB)
910 Automated verification of continuous and hybrid dynamical systems William Denman 2017-07 PhD
178 p
PDF (3.5 MB)
909 Exploring new attack vectors for the exploitation of smartphones Laurent Simon 2017-07 PhD
167 p
PDF (3.3 MB)
908 ASAP: As Static As Possible memory management Raphaël L. Proust 2017-07 PhD
147 p
PDF (1.0 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
906 Context-aware programming languages Tomas Petricek 2017-03 PhD
218 p
PDF (1.7 MB)
905 Fixed point promotion: taking the induction out of automated induction William Sonnex 2017-03 PhD
170 p
PDF (0.9 MB)
904 Grammatical error correction in non-native English Zheng Yuan 2017-03 PhD
145 p
PDF (1.4 MB)
903 Parameterized complexity of distances to sparse graph classes Jannis Bulian 2017-02 PhD
133 p
PDF (1.2 MB)
902 Programming language evolution Raoul-Gabriel Urma 2017-02 PhD
129 p
PDF (2.0 MB)
901 Signal maps for smartphone localisation Chao Gao 2017-02 PhD
127 p
PDF (23.7 MB)
900 A framework to build bespoke auto-tuners with structured Bayesian optimisation Valentin Dalibard 2017-02 PhD
182 p
PDF (2.6 MB)
899 Deep embodiment: grounding semantics in perceptual modalities Douwe Kiela 2017-02 PhD
128 p
PDF (5.8 MB)
898 Access control for network management Dongting Yu 2017-01 PhD
108 p
PDF (0.8 MB)
897 Characterization of Internet censorship from multiple perspectives Sheharbano Khattak 2017-01 PhD
170 p
PDF (3.6 MB)
896 Learning to de-anonymize social networks Kumar Sharad 2016-12 PhD
158 p
PDF (6.9 MB)
895 Artificial error generation for translation-based grammatical error correction Mariano Felice 2016-10 PhD
155 p
PDF (1.2 MB)
894 Issues in preprocessing current datasets for grammatical error correction Christopher Bryant, Mariano Felice 2016-09 15 p PDF (0.4 MB)
893 Towards practical information flow control and audit Thomas F. J.-M. Pasquier 2016-07 PhD
153 p
PDF (1.5 MB)
892 Pipelined image processing for pattern recognition A. Daniel Hall 2016-07 PhD
121 p
PDF (8.7 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
890 Using multiple representations to develop notational expertise in programming Alistair G. Stead 2016-06 PhD
301 p
PDF (24.8 MB)
889 Evaluating the viability of remote renewable energy in datacentre computing Sherif Akoush, Ripduman Sohan, et al. 2016-05 26 p PDF (0.6 MB)
888 Recomputation-based data reliability for MapReduce using lineage Sherif Akoush, Ripduman Sohan, Andy Hopper 2016-05 19 p PDF (0.5 MB)
887 Hardware support for compartmentalisation Robert M. Norton 2016-05 PhD
86 p
PDF (1.2 MB)
886 Error detection in content word combinations Ekaterina Kochmar 2016-05 PhD
170 p
PDF (3.8 MB)
885 HasGP: A Haskell library for Gaussian process inference Sean B. Holden 2016-04 6 p PDF (0.1 MB)
884 Machine learning and computer algebra Zongyan Huang 2016-04 PhD
113 p
PDF (1.5 MB)
883 Survey propagation applied to weighted partial maximum satisfiability Richard Russell, Sean B. Holden 2016-03 15 p PDF (0.3 MB)
882 Discovering and exploiting parallelism in DOACROSS loops Niall Murphy 2016-03 PhD
129 p
PDF (2.4 MB)
881 Web data knowledge extraction Juan M. Tirado, Ovidiu Serban, et al. 2016-03 60 p PDF (0.7 MB)
880 Access contracts: a dynamic approach to object-oriented access protection Janina Voigt 2016-02 PhD
171 p
PDF (1.8 MB)
879 Self-compilation and self-verification Ramana Kumar 2016-02 PhD
148 p
PDF (0.9 MB)
878 Efficient multivariate statistical techniques for extracting secrets from electronic devices Marios O. Choudary 2015-09 PhD
164 p
PDF (14.5 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
875 The language of collaborative tagging Theodosia Togia 2015-09 PhD
203 p
colour
PDF (28.2 MB)
874 Augmented Reality interfaces for symbolic play in early childhood Zhen Bai 2015-09 PhD
292 p
PDF (9.5 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
872 The integration of higher order interactive proof with first order automatic theorem proving Jia Meng 2015-07 PhD
144 p
PDF (1.0 MB)
871 Architecture-neutral parallelism via the Join Calculus Peter R. Calvert 2015-07 PhD
150 p
PDF (1.2 MB)
870 Accelerating control-flow intensive code in spatial hardware Ali Mustafa Zaidi 2015-05 PhD
170 p
PDF (6.3 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
867 Higher-order proof translation Nikolai Sultana 2015-04 PhD
158 p
PDF (2.7 MB)
866 PDTL: Parallel and distributed triangle listing for massive graphs Ilias Giechaskiel, George Panagopoulos, Eiko Yoneki 2015-04 14 p PDF (0.5 MB)
865 I/O Optimisation and elimination via partial evaluation Christopher S.F. Smowton 2014-12 PhD
129 p
PDF (1.1 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
862 Surface modelling for 2D imagery Henrik Lieng 2014-10 PhD
177 p
colour
PDF (22.3 MB)
861 Automatic facial expression analysis Tadas Baltrusaitis 2014-10 PhD
218 p
colour
PDF (15.2 MB)
860 Program equivalence in functional metaprogramming via nominal Scott domains Steffen Loesch 2014-10 PhD
164 p
PDF (1.5 MB)
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
858 CHERI: A RISC capability machine for practical memory safety Jonathan D. Woodruff 2014-07 PhD
112 p
PDF (1.1 MB)
857 ARC: Analysis of Raft Consensus Heidi Howard 2014-07 BA
69 p
PDF (1.2 MB)
856 Sentiment analysis of scientific citations Awais Athar 2014-06 PhD
114 p
colour
PDF (4.4 MB)
855 Mephistophone Patrick K.A. Wollner, Isak Herman, et al. 2014-06 8 p PDF (1.1 MB)
854 Programming contextual computations Dominic Orchard 2014-05 PhD
223 p
PDF (1.7 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
849 SNA: Sourceless Network Architecture Marcelo Bagnulo Braun, Jon Crowcroft 2014-03 12 p PDF (0.2 MB)
848 Automatically generating reading lists James G. Jardine 2014-02 PhD
164 p
PDF (6.4 MB)
847 SBUS: a generic policy-enforcing middleware for open pervasive systems Jatinder Singh, Jean Bacon 2014-02 20 p PDF (1.9 MB)
846 Exploiting tightly-coupled cores Daniel Bates 2014-01 PhD
162 p
PDF (1.5 MB)
845 Black-box composition of mismatched software components Stephen Kell 2013-12 PhD
251 p
PDF (2.8 MB)
844 Decompilation as search Wei Ming Khoo 2013-11 PhD
119 p
PDF (1.2 MB)
843 Programming for humans: a new paradigm for domain-specific languages Robin Message 2013-11 PhD
140 p
PDF (1.6 MB)
842 Automated assessment of English-learner writing Helen Yannakoudakis 2013-10 PhD
151 p
PDF (1.3 MB)
841 Information centric delay tolerant networking: an internet architecture for the challenged Arjuna Sathiaseelan, Dirk Trossen, et al. 2013-09 11 p PDF (0.2 MB)
840 Minimally supervised dependency-based methods for natural language processing Marek Rei 2013-09 PhD
169 p
PDF (1.1 MB)
839 Automatic extraction of property norm-like data from large text corpora Colin Kelly 2013-09 PhD
154 p
PDF (1.0 MB)
838 Mining and tracking in evolving software Silvia Breu 2013-06 PhD
104 p
PDF (2.0 MB)
837 Human-data interaction Hamed Haddadi, Richard Mortier, et al. 2013-06 9 p PDF (0.4 MB)
836 Aliasing contracts: a dynamic approach to alias protection Janina Voigt, Alan Mycroft 2013-06 27 p PDF (0.3 MB)
835 Call-by-need supercompilation Maximilian C. Bolingbroke 2013-05 PhD
230 p
PDF (1.6 MB)
834 Concurrent verification for sequential programs John Wickerson 2013-05 PhD
149 p
PDF (1.6 MB)
833 Practice-led design and evaluation of a live visual constraint language Alan F. Blackwell, Ignatios Charalampidis 2013-05 16 p PDF (0.3 MB)
832 Communication centric, multi-core, fine-grained processor architecture Gregory A. Chadwick 2013-04 PhD
165 p
PDF (1.2 MB)
831 Communication for programmability and performance on multi-core processors Meredydd Luff 2013-04 PhD
89 p
PDF (1.3 MB)
830 Massively parallel neural computation Paul J. Fox 2013-03 PhD
105 p
PDF (2.3 MB)
829 Microelectronic security measures Philip Christopher Paul 2013-02 PhD
177 p
colour
PDF (12.6 MB)
828 Exploring networks-on-chip for FPGAs Rosemary M. Francis 2013-01 PhD
121 p
PDF (1.7 MB)
827 The smart card detective: a hand-held EMV interceptor Omar S. Choudary 2012-12 55 p PDF (2.8 MB)
826 GREEN IPTV: a resource and energy efficient network for IPTV Fernando M. V. Ramos 2012-12 PhD
152 p
PDF (3.8 MB)
825 Privacy engineering for social networks Jonathan Anderson 2012-12 PhD
255 p
PDF (3.5 MB)
824 Hardware synthesis from a stream-processing functional language Simon Frankau 2012-11 PhD
202 p
PDF (1.3 MB)
823 Mitigating I/O latency in SSD-based graph traversal Amitabha Roy, Karthik Nilakant, et al. 2012-11 27 p PDF (0.3 MB)
822 Planning with preferences using maximum satisfiability Richard A. Russell 2012-10 PhD
160 p
PDF (2.0 MB)
821 Modelling energy efficiency for computation Charles Reams 2012-10 PhD
135 p
PDF (1.8 MB)
820 A unified graph query layer for multiple databases Eiko Yoneki, Amitabha Roy 2012-08 22 p PDF (0.3 MB)
819 Guessing human-chosen secrets Joseph Bonneau 2012-05 PhD
161 p
PDF (1.7 MB)
818 New approaches to operating system security extensibility Robert N. M. Watson 2012-04 PhD
184 p
PDF (1.2 MB)
817 The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes Joseph Bonneau, Cormac Herley, et al. 2012-03 32 p PDF (0.5 MB)
816 Verification of security protocols based on multicast communication Jean E. Martina 2012-03 PhD
150 p
PDF (1.1 MB)
815 Colour videos with depth: acquisition, processing and evaluation Christian Richardt 2012-03 PhD
132 p
colour
PDF (68.7 MB)
814 The free Internet: a distant mirage or near reality? Arjuna Sathiaseelan, Jon Crowcroft 2012-02 10 p PDF (0.1 MB)
813 Reconstructing compressed photo and video data Andrew B. Lewis 2012-02 PhD
148 p
colour
PDF (3.5 MB)
812 Abstracting information on body area networks Pedro Brandão 2012-01 PhD
144 p
PDF (4.8 MB)
811 Active electromagnetic attacks on secure hardware A. Theodore Markettos 2011-12 PhD
217 p
colour
PDF (10.6 MB)
810 Proximity Coherence for chip-multiprocessors Nick Barrow-Williams 2011-11 PhD
164 p
PDF (3.8 MB)
809 Distributed virtual environment scalability and security John L. Miller 2011-10 PhD
98 p
PDF (1.9 MB)
808 Resource-sensitive synchronisation inference by abduction Matko Botinčan, Mike Dodds, Suresh Jagannathan 2012-01 57 p PDF (0.6 MB)
807 Second-order algebraic theories Ola Mahmoud 2011-10 PhD
133 p
PDF (0.9 MB)
806 On joint diagonalisation for dynamic network analysis Damien Fay, Jérôme Kunegis, Eiko Yoneki 2011-10 12 p PDF (0.8 MB)
805 A model personal energy meter Simon Hay 2011-09 PhD
207 p
PDF (24.6 MB)
804 The HasGP user manual Sean B. Holden 2011-09 18 p PDF (0.3 MB)
803 Computational approaches to figurative language Ekaterina V. Shutova 2011-08 PhD
219 p
PDF (1.8 MB)
802 Latent semantic sentence clustering for multi-document summarization Johanna Geiß 2011-07 PhD
156 p
PDF (1.0 MB)
801 Software lock elision for x86 machine code Amitabha Roy 2011-07 PhD
154 p
PDF (1.4 MB)
800 Improving cache utilisation James R. Srinivasan 2011-06 PhD
184 p
PDF (3.4 MB)
799 A separation logic framework for HOL Thomas Tuerk 2011-06 PhD
271 p
PDF (2.4 MB)
798 Practical memory safety for C Periklis Akritidis 2011-06 PhD
136 p
PDF (2.1 MB)
797 Interpretational overhead in system software Boris Feigin 2011-04 PhD
116 p
PDF (1.2 MB)
796 Facilitating program parallelisation: a profiling-based approach Jonathan Mak 2011-03 PhD
120 p
PDF (1.2 MB)
795 Underspecified quantification Aurelie Herbelot 2011-02 PhD
163 p
PDF (1.1 MB)
794 Grammatical error prediction Øistein E. Andersen 2011-01 PhD
163 p
PDF (1.6 MB)
793 Affect inference in learning environments: a functional view of facial affect analysis using naturalistic data Shazia Afzal 2010-12 PhD
146 p
PDF (3.0 MB)
792 Machine learning and automated theorem proving James P. Bridge 2010-11 PhD
180 p
PDF (3.5 MB)
791 Semi-supervised learning for biomedical information extraction Andreas Vlachos 2010-11 PhD
113 p
PDF (1.0 MB)
790 Automated assessment of ESOL free text examinations Ted Briscoe, Ben Medlock, Øistein Andersen 2010-11 31 p PDF (0.5 MB)
789 Making prophecies with decision predicates Byron Cook, Eric Koskinen 2010-11 29 p PDF (0.6 MB)
788 Branching-time reasoning for programs (extended version) Byron Cook, Eric Koskinen, Moshe Vardi 2011-07 38 p PDF (0.9 MB)
787 Emotion inference from human body motion Daniel Bernhardt 2010-10 PhD
227 p
PDF (8.7 MB)
786 Communication flows in power-efficient Networks-on-Chips Arnab Banerjee 2010-08 PhD
107 p
PDF (1.2 MB)
785 Anonymity, information, and machine-assisted proof Aaron R. Coble 2010-07 PhD
171 p
PDF (1.1 MB)
784 Characterizing 10 Gbps network interface energy consumption Ripduman Sohan, Andrew Rice, et al. 2010-07 10 p PDF (0.2 MB)
783 Distributed complex event detection for pervasive computing Dan O’Keeffe 2010-07 PhD
170 p
PDF (1.3 MB)
782 Petri net semantics Jonathan M. Hayman 2010-06 PhD
252 p
PDF (2.1 MB)
781 Stage scheduling for CPU-intensive servers Minor E. Gordon 2010-06 PhD
119 p
PDF (0.9 MB)
780 Cryptography and evidence Michael Roe 2010-05 PhD
75 p
PDF (0.5 MB)
779 A text representation language for contextual and distributional processing Eric K. Henderson 2010-04 PhD
207 p
PDF (2.6 MB)
778 Automatically proving linearizability Viktor Vafeiadis 2016-09 19 p PDF (0.4 MB)
777 Concurrent Abstract Predicates Thomas Dinsdale-Young, Mike Dodds, et al. 2010-04 43 p PDF (0.5 MB)
776 System tests from unit tests Kathryn E. Gray, Alan Mycroft 2010-03 27 p PDF (0.3 MB)
775 Creating high-performance, statically type-safe network applications Anil Madhavapeddy 2010-03 PhD
169 p
PDF (2.0 MB)
774 Explicit stabilisation for modular rely-guarantee reasoning John Wickerson, Mike Dodds, Matthew Parkinson 2010-03 29 p PDF (0.9 MB)
773 NURBS-compatible subdivision surfaces Thomas J. Cashman 2010-03 PhD
99 p
colour
PDF (6.1 MB)
772 An executable meta-language for inductive definitions with binders Matthew R. Lakin 2010-03 PhD
171 p
PDF (1.1 MB)
771 Bodies-in-Space: investigating technology usage in co-present group interaction Cecily Morrison 2010-03 PhD
147 p
PDF (4.6 MB)
770 Controlling the dissemination and disclosure of healthcare events Jatinder Singh 2010-02 PhD
193 p
PDF (4.2 MB)
769 Kilim: A server framework with lightweight actors, isolation types and zero-copy messaging Sriram Srinivasan 2010-02 PhD
127 p
PDF (1.4 MB)
768 Report on existing open-source electronic medical records Cecily Morrison, Adona Iosif, Miklos Danka 2010-02 12 p
colour
PDF (1.1 MB)
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
766 Towards robust inexact geometric computation Julian M. Smith 2009-12 PhD
186 p
colour
PDF (1.9 MB)
765 Formal verification of machine-code programs Magnus O. Myreen 2009-12 PhD
109 p
PDF (0.8 MB)
764 Statistical anaphora resolution in biomedical texts Caroline V. Gasperin 2009-12 PhD
124 p
PDF (1.8 MB)
763 Security for volatile FPGAs Saar Drimer 2009-11 PhD
169 p
PDF (3.2 MB)
762 Resource provisioning for virtualized server applications Evangelia Kalyvianaki 2009-11 PhD
161 p
PDF (2.0 MB)
761 Programming networks of vehicles Jonathan J. Davies 2009-11 PhD
292 p
PDF (4.7 MB)
760 Radical innovation: crossing knowledge boundaries with interdisciplinary teams Alan F. Blackwell, Lee Wilson, et al. 2009-11 124 p PDF (0.7 MB)
759 Coarse-grained transactions (extended version) Eric Koskinen, Matthew Parkinson, Maurice Herlihy 2011-08 34 p PDF (0.6 MB)
758 Logics and analyses for concurrent heap-manipulating programs Alexey Gotsman 2009-10 PhD
160 p
PDF (1.3 MB)
757 Improving cache performance by runtime data movement Mark Adcock 2009-07 PhD
174 p
colour
PDF (1.3 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
755 Skin-detached surface for interactive large mesh editing Yujian Gao, Aimin Hao, et al. 2009-09 18 p PDF (1.1 MB)
754 Understanding scam victims: seven principles for systems security Frank Stajano, Paul Wilson 2009-08 22 p PDF (0.3 MB)
753 Carbon: trusted auditing for P2P distributed virtual environments John L. Miller, Jon Crowcroft 2009-08 20 p PDF (0.8 MB)
752 Security of proximity identification systems Gerhard P. Hancke 2009-07 PhD
161 p
PDF (5.8 MB)
751 Nominal domain theory for concurrency David C. Turner 2009-07 PhD
185 p
PDF (1.3 MB)
750 AtoZ: an automatic traffic organizer using NetFPGA Marco Canini, Wei Li, et al. 2009-05 27 p PDF (0.8 MB)
749 Identifying social communities in complex communications for network efficiency Pan Hui, Eiko Yoneki, et al. 2009-05 14 p PDF (0.7 MB)
748 GTVS: boosting the collection of application traffic ground truth Marco Canini, Wei Li, Andrew W. Moore 2009-04 20 p PDF (0.3 MB)
747 An estimator of forward and backward delay for multipath transport Fei Song, Hongke Zhang, et al. 2009-03 16 p PDF (0.8 MB)
746 The snooping dragon: social-malware surveillance of the Tibetan movement Shishir Nagaraja, Ross Anderson 2009-03 12 p PDF (0.3 MB)
745 A better x86 memory model: x86-TSO (extended version) Scott Owens, Susmit Sarkar, Peter Sewell 2009-03 52 p PDF (0.6 MB)
744 Citation context analysis for information retrieval Anna Ritchie 2009-03 PhD
119 p
PDF (0.8 MB)
743 Optimising the speed and accuracy of a Statistical GLR Parser Rebecca F. Watson 2009-03 PhD
145 p
PDF (1.4 MB)
742 TCP, UDP, and Sockets: Volume 3: The Service-level Specification Thomas Ridge, Michael Norrish, Peter Sewell 2009-02 305 p PDF (2.6 MB)
741 Vehicular wireless communication David N. Cottingham 2009-01 PhD
264 p
PDF (3.6 MB)
740 Analysis of affective expression in speech Tal Sobol-Shikler 2009-01 PhD
163 p
PDF (2.7 MB)
739 State-based Publish/Subscribe for sensor systems Salman Taherian 2009-01 PhD
240 p
PDF (4.1 MB)
738 High precision timing using self-timed circuits Scott Fairbanks 2009-01 PhD
99 p
PDF (13.2 MB)
737 Static contract checking for Haskell Na Xu 2008-12 PhD
175 p
PDF (1.0 MB)
736 Deny-guarantee reasoning Mike Dodds, Xinyu Feng, et al. 2009-01 82 p PDF (0.6 MB)
735 Learning compound noun semantics Diarmuid Ó Séaghdha 2008-12 PhD
167 p
PDF (1.5 MB)
734 Tabletop interfaces for remote collaboration Philip Tuddenham 2008-12 PhD
243 p
PDF (23.5 MB)
733 Tangible user interfaces for peripheral interaction Darren Edge 2008-12 PhD
237 p
PDF (8.6 MB)
732 Computing surfaces – a platform for scalable interactive displays Alban Rrustemi 2008-11 PhD
156 p
PDF (5.0 MB)
731 A new approach to Internet banking Matthew Johnson 2008-09 PhD
113 p
PDF (1.3 MB)
730 Adaptive evaluation of non-strict programs Robert J. Ennals 2008-08 PhD
243 p
PDF (2.7 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
728 A robust efficient algorithm for point location in triangulations Peter J.C. Brown, Christopher T. Faigle 1997-02 16 p PDF (0.3 MB)
727 A novel auto-calibration system for wireless sensor motes Ruoshui Liu, Ian J. Wassell 2008-09 65 p PDF (5.5 MB)
726 Modular fine-grained concurrency verification Viktor Vafeiadis 2008-07 PhD
148 p
PDF (1.2 MB)
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
724 Bayesian inference for latent variable models Ulrich Paquet 2008-07 PhD
137 p
PDF (2.0 MB)
723 Animation manifolds for representing topological alteration Richard Southern 2008-07 PhD
131 p
PDF (6.7 MB)
722 Energy-efficient sentient computing Mbou Eyole-Monono 2008-07 PhD
138 p
PDF (4.2 MB)
721 Investigating classification for natural language processing tasks Ben W. Medlock 2008-06 PhD
138 p
PDF (1.4 MB)
720 A capability-based access control architecture for multi-domain publish/subscribe systems Lauri I.W. Pesonen 2008-06 PhD
175 p
PDF (2.5 MB)
719 The Intelligent Book: technologies for intelligent and adaptive textbooks, focussing on Discrete Mathematics William H. Billingsley 2008-06 PhD
156 p
PDF (3.2 MB)
718 Cooperative attack and defense in distributed networks Tyler Moore 2008-06 PhD
172 p
PDF (1.7 MB)
717 Psychologically-based simulation of human behaviour Stephen Julian Rymill 2008-06 PhD
250 p
PDF (25.5 MB)
716 UpgradeJ: Incremental typechecking for class upgrades Gavin M. Bierman, Matthew J. Parkinson, James Noble 2008-04 35 p PDF (0.5 MB)
715 On using fuzzy data in security mechanisms Feng Hao 2008-04 PhD
69 p
PDF (1.6 MB)
714 A wide-area file system for migrating virtual machines Tim Moreton 2008-03 PhD
163 p
PDF (1.7 MB)
713 People are the network: experimental design and evaluation of social-based forwarding algorithms Pan Hui 2008-03 PhD
160 p
PDF (4.6 MB)
712 Flash-exposure high dynamic range imaging: virtual photography and depth-compensating flash Christian Richardt 2008-03 9 p PDF (2.6 MB)
711 Thinking inside the box: system-level failures of tamper proofing Saar Drimer, Steven J. Murdoch, Ross Anderson 2008-02 37 p PDF (5.4 MB)
710 Event structures with persistence Lucy G. Brace-Evans 2008-02 PhD
113 p
PDF (0.9 MB)
709 Protocols and technologies for security in pervasive computing and communications Ford Long Wong 2008-01 PhD
167 p
PDF (1.8 MB)
708 IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks Chi-Kin Chau, Jon Crowcroft, et al. 2008-01 24 p PDF (0.3 MB)
707 Complexity-effective superscalar embedded processors using instruction-level distributed processing Ian Caulfield 2007-12 PhD
130 p
PDF (0.7 MB)
706 Covert channel vulnerabilities in anonymity systems Steven J. Murdoch 2007-12 PhD
140 p
PDF (1.8 MB)
705 Optimizing compilation with the Value State Dependence Graph Alan C. Lawrence 2007-12 PhD
183 p
colour
PDF (3.8 MB)
704 Complexity and infinite games on finite graphs Paul William Hunter 2007-11 PhD
170 p
PDF (1.5 MB)
703 Lazy Susan: dumb waiting as proof of work Jon Crowcroft, Tim Deegan, et al. 2007-11 23 p PDF (0.3 MB)
702 Relationships for object-oriented programming languages Alisdair Wren 2007-11 PhD
153 p
PDF (1.2 MB)
701 Vector microprocessors for cryptography Jacques Jean-Alain Fournier 2007-10 PhD
174 p
PDF (1.7 MB)
700 Context aware service composition Maja Vuković 2007-10 PhD
225 p
PDF (1.7 MB)
699 A smooth manifold based construction of approximating lofted surfaces Richard Southern, Neil A. Dodgson 2007-10 17 p PDF (1.8 MB)
698 Pulse-based, on-chip interconnect Simon J. Hollis 2007-09 PhD
186 p
PDF (3.9 MB)
697 Scaling Mount Concurrency: scalability and progress in concurrent algorithms Chris J. Purcell 2007-08 PhD
155 p
PDF (1.0 MB)
696 An introduction to inertial navigation Oliver J. Woodman 2007-08 37 p PDF (0.9 MB)
695 Efficient maximum-likelihood decoding of spherical lattice codes Karen Su, Inaki Berenguer, et al. 2007-07 29 p PDF (0.4 MB)
694 Anti-Ω: the weakest failure detector for set agreement Piotr Zieliński 2007-07 24 p PDF (0.3 MB)
693 Automatic classification of eventual failure detectors Piotr Zieliński 2007-07 21 p PDF (0.3 MB)
692 Toward an undergraduate programme in Interdisciplinary Design Alan F. Blackwell 2007-07 13 p PDF (0.2 MB)
691 Preconditions on geometrically sensitive subdivision schemes Neil A. Dodgson, Malcolm A. Sabin, Richard Southern 2007-08 13 p PDF (0.5 MB)
690 Cluster storage for commodity computation Russell Glen Ross 2007-06 PhD
178 p
PDF (1.3 MB)
689 Removing polar rendering artifacts in subdivision surfaces Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin 2007-06 7 p PDF (0.5 MB)
688 Name-passing process calculi: operational models and structural operational semantics Sam Staton 2007-06 PhD
245 p
PDF (2.1 MB)
687 A marriage of rely/guarantee and separation logic Viktor Vafeiadis, Matthew Parkinson 2007-06 31 p PDF (0.4 MB)
686 Dependable systems for Sentient Computing Andrew C. Rice 2007-05 150 p PDF (1.9 MB)
685 Effect of severe image compression on iris recognition performance John Daugman, Cathryn Downing 2007-05 20 p PDF (0.4 MB)
684 Bubble Rap: Forwarding in small world DTNs in ever decreasing circles Pan Hui, Jon Crowcroft 2007-05 44 p PDF (1.0 MB)
683 Simulation of colliding constrained rigid bodies Martin Kleppmann 2007-04 65 p PDF (6.9 MB)
682 Translating HOL functions to hardware Juliano Iyoda 2007-04 PhD
89 p
PDF (0.7 MB)
681 Indirect channels: a bandwidth-saving technique for fault-tolerant protocols Piotr Zieliński 2007-04 24 p PDF (0.3 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
679 Automatic summarising: a review and discussion of the state of the art Karen Spärck Jones 2007-01 67 p PDF (0.6 MB)
678 Compact forbidden-set routing Andrew D. Twigg 2006-12 PhD
115 p
PDF (1.1 MB)
677 ECCO: Data centric asynchronous communication Eiko Yoneki 2006-12 PhD
210 p
PDF (6.6 MB)
676 Road traffic analysis using MIDAS data: journey time prediction R.J. Gibbens, Y. Saacti 2006-12 35 p PDF (4.6 MB)
675 Computational models for first language acquisition Paula J. Buttery 2006-11 PhD
176 p
PDF (1.3 MB)
674 Landmark Guided Forwarding Meng How Lim 2006-10 PhD
109 p
PDF (0.9 MB)
673 Probabilistic word sense disambiguation : Analysis and techniques for combining knowledge sources Judita Preiss 2006-08 PhD
108 p
PDF (0.8 MB)
672 Decomposing file data into discernible items Calicrates Policroniades-Borraz 2006-08 PhD
230 p
PDF (1.6 MB)
671 Low-latency Atomic Broadcast in the presence of contention Piotr Zieliński 2006-07 23 p PDF (0.3 MB)
670 On the application of program analysis and transformation to high reliability hardware Sarah Thompson 2006-07 PhD
215 p
PDF (5.8 MB)
669 Active privilege management for distributed access control systems David M. Eyers 2006-06 PhD
222 p
PDF (1.9 MB)
668 Optimistically Terminating Consensus Piotr Zieliński 2006-06 35 p PDF (0.4 MB)
667 Minimizing latency of agreement protocols Piotr Zieliński 2006-06 PhD
239 p
PDF (2.0 MB)
666 A pact with the Devil Mike Bond, George Danezis 2006-06 14 p PDF (0.2 MB)
665 Security evaluation at design time for cryptographic hardware Huiyun Li 2006-04 PhD
81 p
PDF (1.9 MB)
664 Designing knowledge: An interdisciplinary experiment in research infrastructure for shared description Alan F. Blackwell 2006-04 18 p PDF (0.7 MB)
663 Syntax-driven analysis of context-free languages with respect to fuzzy relational semantics Richard Bergmair 2006-03 49 p PDF (0.4 MB)
662 An introduction to tag sequence grammars and the RASP system parser Ted Briscoe 2006-03 30 p PDF (0.3 MB)
661 Compatible RMRS representations from RASP and the ERG Anna Ritchie 2006-03 41 p PDF (1.1 MB)
660 Static program analysis based on virtual register renaming Jeremy Singer 2006-02 PhD
183 p
PDF (1.6 MB)
659 A safety proof of a lazy concurrent list-based set implementation Viktor Vafeiadis, Maurice Herlihy, et al. 2006-01 19 p PDF (0.2 MB)
658 Intrinsic point-based surface processing Carsten Moenning 2006-01 PhD
166 p
PDF (8.1 MB)
657 Security protocol design by composition Hyun-Jin Choi 2006-01 PhD
155 p
PDF (0.9 MB)
656 Seamless mobility in 4G systems Pablo Vidales 2005-11 PhD
141 p
PDF (1.8 MB)
655 Wearing proper combinations Karen Spärck Jones 2005-11 27 p PDF (0.3 MB)
654 Local reasoning for Java Matthew J. Parkinson 2005-11 PhD
120 p
PDF (1.1 MB)
653 Anonymity and traceability in cyberspace Richard Clayton 2005-11 PhD
189 p
PDF (1.7 MB)
652 Discriminative training methods and their applications to handwriting recognition Roongroj Nopsuwanchai 2005-11 PhD
186 p
PDF (2.1 MB)
651 End-user programming in multiple languages Rob Hague 2005-10 PhD
122 p
PDF (3.1 MB)
650 Parallel iterative solution method for large sparse linear equation systems Rashid Mehmood, Jon Crowcroft 2005-10 22 p PDF (1.9 MB)
649 The decolorize algorithm for contrast enhancing, color to grayscale conversion Mark Grundland, Neil A. Dodgson 2005-10 15 p
colour
PDF (12.2 MB)
648 Cassandra: flexible trust management and its application to electronic health records Moritz Y. Becker 2005-10 PhD
214 p
PDF (1.4 MB)
647 An agent architecture for simulation of end-users in programming-like tasks Sam Staton 2005-10 12 p PDF (0.2 MB)
645 RFID is X-ray vision Frank Stajano 2005-08 10 p PDF (0.1 MB)
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
643 Using trust and risk for access control in Global Computing Nathan E. Dimmock 2005-08 PhD
145 p
PDF (1.8 MB)
642 First-class relationships in an object-oriented language Gavin Bierman, Alisdair Wren 2005-08 53 p PDF (0.5 MB)
641 Cryptographic processors – a survey Ross Anderson, Mike Bond, et al. 2005-08 19 p PDF (0.6 MB)
640 Combining cryptography with biometrics effectively Feng Hao, Ross Anderson, John Daugman 2005-07 17 p PDF (0.2 MB)
639 Non-blocking hashtables with open addressing Chris Purcell, Tim Harris 2005-09 23 p PDF (0.3 MB)
638 Optimistic Generic Broadcast Piotr Zieliński 2005-07 22 p PDF (0.3 MB)
637 The topology of covert conflict Shishir Nagaraja, Ross Anderson 2005-07 15 p PDF (0.2 MB)
636 Mind-reading machines: automated inference of complex mental states Rana Ayman el Kaliouby 2005-07 PhD
185 p
PDF (24.3 MB)
635 Results from 200 billion iris cross-comparisons John Daugman 2005-06 8 p PDF (0.2 MB)
634 Visualisation, interpretation and use of location-aware interfaces Kasim Rehman 2005-05 PhD
159 p
PDF (2.8 MB)
633 On deadlock, livelock, and forward progress Alex Ho, Steven Smith, Steven Hand 2005-05 8 p PDF (0.2 MB)
632 Between shallow and deep: an experiment in automatic summarising R.I. Tucker, K. Spärck Jones 2005-04 34 p PDF (0.3 MB)
631 MIRRORS: An integrated framework for capturing real world behaviour for models of ad hoc networks Wenjun Hu, Jon Crowcroft 2005-04 16 p PDF (0.5 MB)
630 Semi-invasive attacks – A new approach to hardware security analysis Sergei P. Skorobogatov 2005-04 PhD
144 p
PDF (11.8 MB)
629 Hybrid routing: A pragmatic approach to mitigating position uncertainty in geo-routing Meng How Lim, Adam Greenhalgh, et al. 2005-04 26 p PDF (0.4 MB)
628 A formal security policy for an NHS electronic health record service Moritz Y. Becker 2005-03 81 p PDF (0.6 MB)
627 Efficient computer interfaces using continuous gestures, language models, and speech Keith Vertanen 2005-03 MPhil
46 p
PDF (0.6 MB)
626 Landmark Guided Forwarding: A hybrid approach for Ad Hoc routing Meng How Lim, Adam Greenhalgh, et al. 2005-03 28 p PDF (0.4 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
623 Simple polymorphic usage analysis Keith Wansbrough 2005-03 PhD
364 p
PDF (3.1 MB)
622 Cooperation and deviation in market-based resource allocation Jörg H. Lepler 2005-03 PhD
173 p
PDF (2.3 MB)
621 Fresh Objective Caml user manual Mark R. Shinwell, Andrew M. Pitts 2005-02 21 p PDF (0.2 MB)
620 Middleware support for context-awareness in distributed sensor-driven systems Eleftheria Katsiri 2005-02 PhD
176 p
PDF (1.9 MB)
619 Operating system support for simultaneous multithreaded processors James R. Bulpin 2005-02 PhD
130 p
PDF (1.3 MB)
618 The Fresh Approach: functional programming with names and binders Mark R. Shinwell 2005-02 PhD
111 p
PDF (0.9 MB)
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
616 Dictionary characteristics in cross-language information retrieval Donnla Nic Gearailt 2005-02 PhD
158 p
PDF (1.2 MB)
615 Global public computing Evangelos Kotsovinos 2005-01 PhD
229 p
PDF (1.8 MB)
614 Pure bigraphs Robin Milner 2005-01 66 p PDF (0.6 MB)
613 Abstracting application-level security policy for ubiquitous computing David J. Scott 2005-01 PhD
186 p
PDF (2.2 MB)
612 Location privacy in ubiquitous computing Alastair R. Beresford 2005-01 PhD
139 p
PDF (1.9 MB)
611 An heuristic analysis of the classification of bivariate subdivision schemes Neil A. Dodgson 2004-12 18 p PDF (0.3 MB)
610 Influence of syntax on prosodic boundary prediction Tommy Ingulfsen 2004-12 MPhil
49 p
PDF (0.4 MB)
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
608 Trust management for widely distributed systems Walt Yao 2004-11 PhD
191 p
PDF (1.5 MB)
607 Code size optimization for embedded processors Neil E. Johnson 2004-11 PhD
159 p
PDF (1.0 MB)
606 Dynamic binary analysis and instrumentation Nicholas Nethercote 2004-11 PhD
177 p
PDF (1.1 MB)
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
604 On the anonymity of anonymity systems Andrei Serjantov 2004-10 PhD
162 p
PDF (0.9 MB)
603 Bigraphs whose names have multiple locality Robin Milner 2004-09 15 p PDF (0.2 MB)
602 Model checking the AMBA protocol in HOL Hasan Amjad 2004-09 27 p PDF (0.3 MB)
601 Combining model checking and theorem proving Hasan Amjad 2004-09 PhD
131 p
PDF (0.9 MB)
600 Trust for resource control: Self-enforcing automatic rational contracts between computers Brian Ninham Shand 2004-08 PhD
154 p
PDF (1.1 MB)
599 Further analysis of ternary and 3-point univariate subdivision schemes Mohamed F. Hassan 2004-08 9 p PDF (0.3 MB)
598 Transition systems, link graphs and Petri nets James J. Leifer, Robin Milner 2004-08 64 p PDF (0.6 MB)
597 Syntactic simplification and text cohesion Advaith Siddharthan 2004-08 PhD
195 p
PDF (1.3 MB)
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
595 Representations of quantum operations, with applications to quantum cryptography Pablo J. Arrighi 2004-07 PhD
157 p
PDF (1.0 MB)
594 Designing and attacking anonymous communication systems George Danezis 2004-07 PhD
150 p
PDF (1.5 MB)
593 Paxos at war Piotr Zieliński 2004-06 30 p PDF (0.3 MB)
592 Unwrapping the Chrysalis Mike Bond, Daniel Cvrček, Steven J. Murdoch 2004-06 15 p PDF (0.4 MB)
591 Conversion of notations Silas S. Brown 2004-06 PhD
159 p
PDF (2.4 MB)
590 Hermes: A scalable event-based middleware Peter R. Pietzuch 2004-06 PhD
180 p
PDF (1.6 MB)
589 new-HOPLA — a higher-order process language with name generation Glynn Winskel, Francesco Zappa Nardelli 2004-05 16 p PDF (0.3 MB)
588 MulTEP: A MultiThreaded Embedded Processor Panit Watcharawitch 2004-05 PhD
190 p
PDF (3.6 MB)
587 Verification of asynchronous circuits Paul Alexander Cunningham 2004-04 PhD
174 p
PDF (1.5 MB)
586 Role-based access control policy administration András Belokosztolszki 2004-03 PhD
170 p
PDF (2.6 MB)
585 Personal projected displays Mark S. D. Ashdown 2004-03 PhD
150 p
PDF (3.4 MB)
584 Concise texture editing Stephen Brooks 2004-03 PhD
164 p
PDF (20.0 MB)
583 Subdivision as a sequence of sampled Cp surfaces and conditions for tuning schemes Cédric Gérot, Loïc Barthe, et al. 2004-03 68 p PDF (0.5 MB)
582 Latency-optimal Uniform Atomic Broadcast algorithm Piotr Zieliński 2004-02 28 p PDF (0.3 MB)
581 Axioms for bigraphical structure Robin Milner 2004-02 26 p PDF (0.3 MB)
580 Bigraphs and mobile processes (revised) Ole Høgh Jensen, Robin Milner 2004-02 131 p PDF (1.0 MB)
579 Practical lock-freedom Keir Fraser 2004-02 PhD
116 p
PDF (0.7 MB)
578 Linear types for packet processing (extended version) Robert Ennals, Richard Sharp, Alan Mycroft 2004-01 31 p PDF (0.3 MB)
577 Compromising emanations: eavesdropping risks of computer displays Markus G. Kuhn 2003-12 PhD
167 p
PDF (8.4 MB)
576 An implementation of a coordinate based location system David R. Spence 2003-11 12 p PDF (0.9 MB)
575 Reconfigurable wavelength-switched optical networks for the Internet core Tim Granger 2003-11 PhD
184 p
colour
PDF (2.5 MB)
574 Sketchpad: A man-machine graphical communication system Ivan Edward Sutherland 2003-09 PhD
149 p
PDF (4.1 MB)
573 Mechanizing compositional reasoning for concurrent systems: some lessons Lawrence C. Paulson 2003-08 20 p PDF (0.3 MB)
572 Design choices for language-based transactions Tim Harris 2003-08 7 p PDF (0.2 MB)
571 Multi-layer network monitoring and analysis James Hall 2003-07 PhD
230 p
colour
PDF (2.8 MB)
570 Bigraphs and mobile processes Ole Høgh Jensen, Robin Milner 2003-07 121 p PDF (0.9 MB)
569 Global abstraction-safe marshalling with hash types James J. Leifer, Gilles Peskine, et al. 2003-06 86 p PDF (0.8 MB)
568 Dynamic rebinding for marshalling and update, with destruct-time λ Gavin Bierman, Michael Hicks, et al. 2004-02 85 p PDF (0.7 MB)
567 Using inequalities as term ordering constraints Joe Hurd 2003-06 17 p PDF (0.3 MB)
566 Formal verification of probabilistic algorithms Joe Hurd 2003-05 PhD
154 p
PDF (0.9 MB)
565 Fast Marching farthest point sampling for point clouds and implicit surfaces Carsten Moenning, Neil A. Dodgson 2003-05 15 p PDF (0.5 MB)
564 Access policies for middleware Ulrich Lang 2003-05 PhD
138 p
PDF (0.8 MB)
563 MJ: An imperative core calculus for Java and Java with effects G.M. Bierman, M.J. Parkinson, A.M. Pitts 2003-04 53 p PDF (0.5 MB)
562 Fast Marching farthest point sampling Carsten Moenning, Neil A. Dodgson 2003-04 16 p PDF (0.5 MB)
561 Resource control of untrusted code in an open network environment Paul B. Menage 2003-03 PhD
185 p
colour
PDF (1.1 MB)
560 Decimalisation table attacks for PIN cracking Mike Bond, Piotr Zieliński 2003-02 14 p PDF (0.2 MB)
559 Pronto: MobileGateway with publish-subscribe paradigm over wireless network Eiko Yoneki, Jean Bacon 2003-02 22 p PDF (0.5 MB)
558 A role and context based security model Yolanta Beresnevichiene 2003-01 PhD
89 p
PDF (0.5 MB)
557 Iota: A concurrent XML scripting language with applications to Home Area Networking G.M. Bierman, P. Sewell 2003-01 32 p PDF (0.3 MB)
556 Turing Switches – Turing machines for all-optical Internet routing Jon Crowcroft 2003-01 7 p PDF (0.2 MB)
555 BOURSE – Broadband Organisation of Unregulated Radio Systems through Economics Jon Crowcroft, Richard Gibbens, Stephen Hailes 2003-01 10 p PDF (0.2 MB)
554 Towards a field theory for networks Jon Crowcroft 2003-01 9 p PDF (0.4 MB)
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
552 The Xenoserver computing infrastructure Keir A. Fraser, Steven M. Hand, et al. 2003-01 11 p PDF (0.2 MB)
551 The relative consistency of the axiom of choice — mechanized using Isabelle/ZF Lawrence C. Paulson 2002-12 63 p PDF (0.4 MB)
550 Computer security – a layperson’s guide, from the bottom up Karen Spärck Jones 2002-06 23 p PDF (0.2 MB)
549 Two remarks on public key cryptology Ross Anderson 2002-12 7 p PDF (0.2 MB)
548 Formal verification of the ARM6 micro-architecture Anthony Fox 2002-11 59 p PDF (0.5 MB)
547 Semantic optimization of OQL queries Agathoniki Trigoni 2002-10 PhD
171 p
PDF (1.2 MB)
546 Depth perception in computer graphics Jonathan David Pfautz 2002-09 PhD
182 p
PDF (2.0 MB)
545 A HOL specification of the ARM instruction set architecture Anthony C.J. Fox 2001-06 45 p PDF (0.4 MB)
544 On the support of recursive subdivision I.P. Ivrissimtzis, M.A. Sabin, N.A. Dodgson 2002-09 20 p PDF (4.0 MB)
543 Evaluating similarity-based visualisations as interfaces for image browsing Kerry Rodden 2002-09 PhD
248 p
colour
PDF (8.3 MB)
542 A generative classification of mesh refinement rules with lattice transformations I.P. Ivrissimtzis, N.A. Dodgson, M.A. Sabin 2002-09 13 p PDF (0.2 MB)
541 Different applications of two-dimensional potential fields for volume modeling L. Barthe, N.A. Dodgson, et al. 2002-08 26 p PDF (1.9 MB)
540 The use of computer graphics rendering software in the analysis of a novel autostereoscopic display design N.A. Dodgson, J.R. Moore 2002-08 6 p PDF (0.2 MB)
539 Towards a ternary interpolating subdivision scheme for the triangular mesh N.A. Dodgson, M.A. Sabin, et al. 2002-07 12 p PDF (0.2 MB)
538 The Escritoire: A personal projected display for interacting with documents Mark Ashdown, Peter Robinson 2002-06 12 p PDF (0.5 MB)
537 Parallel systems in symbolic and algebraic computation Mantsika Matooane 2002-06 PhD
139 p
PDF (0.8 MB)
536 Low temperature data remanence in static RAM Sergei Skorobogatov 2002-06 9 p PDF (0.6 MB)
535 Designs, disputes and strategies Claudia Faggian, Martin Hyland 2002-05 21 p PDF (0.3 MB)
534 Resource control in network elements Austin Donnelly 2002-04 PhD
183 p
PDF (1.0 MB)
533 The acquisition of a unification-based generalised categorial grammar Aline Villavicencio 2002-04 PhD
223 p
PDF (2.2 MB)
532 Internet traffic engineering Richard Mortier 2002-04 PhD
129 p
PDF (0.8 MB)
531 Verifying the SET registration protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2002-03 24 p PDF (0.4 MB)
530 Subcategorization acquisition Anna Korhonen 2002-02 PhD
189 p
PDF (1.1 MB)
529 The triVM intermediate language reference manual Neil Johnson 2002-02 83 p PDF (0.4 MB)
528 Measurement-based management of network resources Andrew William Moore 2002-04 PhD
273 p
PDF (1.7 MB)
527 Architectures for ubiquitous systems Umar Saif 2002-01 PhD
271 p
PDF (2.4 MB)
526 Extending lossless image compression Andrew J. Penrose 2001-12 PhD
137 p
PDF (5.3 MB)
525 Extensible virtual machines Timothy L. Harris 2001-12 PhD
209 p
PDF (0.8 MB)
524 Verifying the SET purchase protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2001-11 14 p PDF (0.2 MB)
523 Bigraphical reactive systems: basic theory Robin Milner 2001-09 87 p PDF (1.7 MB)
522 Practical behavioural animation based on vision and attention Mark F.P. Gillies 2001-09 187 p PDF (11.7 MB)
PS (10.1 MB)
521 Operational congruences for reactive systems James Leifer 2001-09 PhD
144 p
PS (0.9 MB)
520 Ternary and three-point univariate subdivision schemes Mohamed Hassan, Neil A. Dodgson 2001-09 8 p PDF (0.1 MB)
519 Local evidence in document retrieval Martin Choquette 2001-08 PhD
177 p
518 An attack on a traitor tracing scheme Jeff Jianxin Yan, Yongdong Wu 2001-07 14 p PDF (0.2 MB)
517 The Cambridge Multimedia Document Retrieval Project: summary of experiments Karen Spärck Jones, P. Jourlin, et al. 2001-07 30 p PS (0.1 MB)
DVI (0.0 MB)
516 Dynamic provisioning of resource-assured and programmable virtual private networks Rebecca Isaacs 2001-09 PhD
145 p
PS (0.5 MB)
515 The UDP calculus: rigorous semantics for real networking Andrei Serjantov, Peter Sewell, Keith Wansbrough 2001-07 70 p PS (0.3 MB)
514 Nomadic π-calculi: expressing and verifying communication infrastructure for mobile computation Asis Unyapoth 2001-06 PhD
316 p
PDF (1.3 MB)
PS (0.7 MB)
513 Generic summaries for indexing in information retrieval – Detailed test results Tetsuya Sakai, Karen Spärck Jones 2001-05 29 p PS (0.1 MB)
512 An algebraic framework for modelling and verifying microprocessors using HOL Anthony Fox 2001-03 24 p PDF (0.3 MB)
511 Software visualization in Prolog Calum Grant 1999-12 PhD
193 p
PDF (2.0 MB)
510 Switchlets and resource-assured MPLS networks Richard Mortier, Rebecca Isaacs, Keir Fraser 2000-05 16 p PDF (0.1 MB)
PS (0.1 MB)
509 Proximity visualisation of abstract data Wojciech Basalaj 2001-01 PhD
117 p
PDF (7.7 MB)
508 Shallow linear action graphs and their embeddings James Leifer, Robin Milner 2000-10 16 p PS (0.1 MB)
507 Mechanizing a theory of program composition for UNITY Lawrence Paulson 2000-11 28 p PDF (0.2 MB)
506 Modules, abstract types, and distributed versioning Peter Sewell 2000-09 46 p PDF (0.4 MB)
PS (0.2 MB)
DVI (0.1 MB)
505 Models for name-passing processes: interleaving and causal Gian Luca Cattani, Peter Sewell 2000-09 42 p PDF (0.5 MB)
PS (0.2 MB)
DVI (0.1 MB)
504 Word sense selection in texts: an integrated model Oi Yee Kwong 2000-09 PhD
177 p
PS (0.6 MB)
503 Hardware/software co-design using functional languages Alan Mycroft, Richard Sharp 2000-09 8 p PDF (0.1 MB)
502 Formalizing basic number theory Thomas Marthedal Rasmussen 2000-09 20 p PDF (1.1 MB)
501 Integrated quality of service management David Ingram 2000-09 PhD
90 p
500 The memorability and security of passwords – some empirical results Jianxin Yan, Alan Blackwell, et al. 2000-09 13 p PDF (0.2 MB)
499 Enhancing spatial deformation for virtual sculpting James Edward Gain 2000-08 PhD
161 p
PDF (13.4 MB)
498 Applied π – a brief tutorial Peter Sewell 2000-07 65 p PDF (0.4 MB)
PS (0.2 MB)
497 Towards a formal type system for ODMG OQL G.M. Bierman, A. Trigoni 2000-09 20 p PDF (1.3 MB)
496 Contexts and embeddings for closed shallow action graphs Gian Luca Cattani, James J. Leifer, Robin Milner 2000-07 56 p PS (0.2 MB)
495 Automatic recognition of words in Arabic manuscripts Mohammad S.M. Khorsheed 2000-07 PhD
242 p
PDF (2.4 MB)
494 An architecture for the notification, storage and retrieval of events Mark David Spiteri 2000-07 PhD
165 p
PDF (12.3 MB)
493 Inductive verification of cryptographic protocols Giampaolo Bella 2000-07 PhD
189 p
PDF (0.8 MB)
492 Nomadic Pict: language and infrastructure design for mobile computation Paweł Tomasz Wojciechowski 2000-06 PhD
184 p
PDF (1.0 MB)
PS (0.4 MB)
491 Is hypothesis testing useful for subcategorization acquisition? Anna Korhonen, Genevive Gorrell, Diana McCarthy 2000-05 9 p PDF (0.8 MB)
490 Selective mesh refinement for rendering Peter John Cameron Brown 2000-04 PhD
179 p
489 Designing a reliable publishing framework Jong-Hyeon Lee 2000-04 PhD
129 p
PDF (0.9 MB)
488 Formal verification of card-holder registration in SET Giampaolo Bella, Fabio Massacci, et al. 2000-03 15 p PDF (1.2 MB)
487 Sequential program composition in UNITY Tanja Vos, Doaitse Swierstra 2000-03 20 p PDF (1.1 MB)
486 Stretching a point: aspect and temporal discourse James Richard Thomas 2000-02 PhD
251 p
485 Three notes on the interpretation of Verilog Daryl Stewart, Myra VanInwegen 2000-01 47 p
484 Automatic summarising and the CLASP system Richard Tucker 2000-01 PhD
190 p
PDF (0.9 MB)
483 Elastic network control Hendrik Jaap Bos 2000-01 PhD
184 p
482 Biometric decision landscapes John Daugman 2000-01 15 p PDF (0.3 MB)
481 Combining the Hol98 proof assistant with the BuDDy BDD package Mike Gordon, Ken Friis Larsen 1999-12 71 p
480 Programming combinations of deduction and BDD-based symbolic calculation Mike Gordon 1999-12 24 p PDF (1.7 MB)
479 The interaction between fault tolerance and security Geraint Price 1999-12 PhD
144 p
PDF (0.9 MB)
478 Secure composition of untrusted code: wrappers and causality types Peter Sewell, Jan Vitek 1999-11 36 p PS (0.2 MB)
477 Presheaf models for CCS-like languages Gian Luca Cattani, Glynn Winskel 1999-11 46 p PDF (2.8 MB)
476 Linking ACL2 and HOL Mark Staples 1999-11 23 p PDF (1.5 MB)
475 A comparison of state-of-the-art classification techniques with application to cytogenetics Boaz Lerner, Neil D. Lawrence 1999-10 34 p PDF (1.4 MB)
474 A Bayesian methodology and probability density estimation for fluorescence in-situ hybridization signal classification Boaz Lerner 1999-10 31 p PDF (1.3 MB)
473 Computer algebra and theorem proving Clemens Ballarin 1999-10 PhD
122 p
PDF (8.6 MB)
472 Simulating music learning with autonomous listening agents: entropy, ambiguity and context Ben Y. Reis 1999-09 PhD
200 p
471 Murphy’s law, the fitness of evolving species, and the limits of software reliability Robert M. Brady, Ross J. Anderson, Robin C. Ball 1999-09 14 p PDF (0.2 MB)
470 Modular reasoning in Isabelle Florian Kammüller 1999-08 PhD
128 p
PDF (11.3 MB)
469 A combination of geometry theorem proving and nonstandard analysis, with application to Newton’s Principia Jacques Désiré Fleuriot 1999-08 PhD
135 p
468 Synthesis of asynchronous circuits Stephen Paul Wilcox 1999-07 PhD
250 p
PDF (1.7 MB)
467 Mechanizing UNITY in Isabelle Lawrence C. Paulson 1999-06 22 p PDF (0.3 MB)
466 Automatic signal classification in fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 24 p PDF (1.2 MB)
465 Gelfish – graphical environment for labelling FISH images Boaz Lerner, Seema Dhanjal, Maj Hultén 1999-05 20 p PDF (1.3 MB)
464 Feature representation for the automatic analysis of fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 36 p PDF (1.6 MB)
463 Secure composition of insecure components Peter Sewell, Jan Vitek 1999-04 44 p PS (0.2 MB)
462 Location-independent communication for mobile agents: a two-level architecture Peter Sewell, Paweł T. Wojciechowski, Benjamin C. Pierce 1999-04 31 p PS (0.1 MB)
461 Integrating Gandalf and HOL Joe Hurd 1999-03 11 p PDF (0.2 MB)
460 Message reception in the inductive approach Giampaolo Bella 1999-03 16 p PDF (0.9 MB)
459 An open parallel architecture for data-intensive applications Mohamad Afshar 1999-07 PhD
225 p
PS (0.8 MB)
DVI (0.3 MB)
458 Final coalgebras as greatest fixed points in ZF set theory Lawrence C. Paulson 1999-03 25 p PDF (0.1 MB)
457 A concurrent object calculus: reduction and typing Andrew D. Gordon, Paul D. Hankin 1999-02 63 p PDF (3.3 MB)
456 An evaluation based approach to process calculi Joshua Robert Xavier Ross 1999-01 PhD
206 p
PDF (13.5 MB)
455 Multiple modalities G.M. Bierman 1998-12 26 p PDF (1.3 MB)
454 Parametric polymorphism and operational equivalence Andrew M. Pitts 1998-12 39 p PDF (2.3 MB)
453 C formalised in HOL Michael Norrish 1998-12 PhD
156 p
PDF (0.8 MB)
452 A formal proof of Sylow’s theorem : An experiment in abstract algebra with Isabelle Hol Florian Kammüller, Lawrence C. Paulson 1998-11 30 p PDF (0.2 MB)
451 The structure of open ATM control architectures Sean Rooney 1998-11 PhD
183 p
PDF (17.2 MB)
450 Open service support for ATM Jacobus Erasmus van der Merwe 1998-11 PhD
164 p
PDF (15.0 MB)
449 Locales : A sectioning concept for Isabelle Florian Kammüller, Markus Wenzel 1998-10 16 p PDF (1.2 MB)
448 A computational interpretation of the λμ calculus G.M. Bierman 1998-09 10 p PDF (1.6 MB)
447 Are timestamps worth the effort? A formal treatment Giampaolo Bella, Lawrence C. Paulson 1998-09 12 p PDF (0.7 MB)
446 A probabilistic model of information and retrieval: development and status K. Spärck Jones, S. Walker, S.E. Robertson 1998-08 74 p PS (0.2 MB)
DVI (0.1 MB)
445 Secure sessions from weak secrets Michael Roe, Bruce Christianson, David Wheeler 1998-07 12 p PDF (1.0 MB)
444 From rewrite rules to bisimulation congruences Peter Sewell 1998-05 72 p PS (0.3 MB)
443 The inductive approach to verifying cryptographic protocols Lawrence C. Paulson 1998-02 46 p PDF (0.3 MB)
PS (0.2 MB)
442 A combination of nonstandard analysis and geometry theorem proving, with application to Newton’s Principia Jacques Fleuriot, Lawrence C. Paulson 1998-01 13 p PS (0.1 MB)
DVI (0.0 MB)
441 A generic tableau prover and its integration with Isabelle Lawrence C. Paulson 1998-01 16 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
440 Inductive analysis of the internet protocol TLS Lawrence C. Paulson 1997-12 19 p PDF (0.2 MB)
PS (0.1 MB)
439 Applying mobile code to distributed systems David A. Halls 1997-12 PhD
158 p
PDF (14.3 MB)
438 An architecture for scalable and deterministic video servers Feng Shi 1997-11 PhD
148 p
PDF (11.3 MB)
437 Trusting in computer systems William S. Harbison 1997-12 PhD
95 p
PDF (1.6 MB)
436 A new method for estimating optical flow W.F. Clocksin 1997-11 20 p PDF (1.5 MB)
435 Global/local subtyping for a distributed π-calculus Peter Sewell 1997-08 57 p PS (0.2 MB)
434 Demonstration programs for CTL and μ-calculus symbolic model checking Martin Richards 1997-08 41 p PDF (1.8 MB)
433 Backtracking algorithms in MCPL using bit patterns and recursion Martin Richards 1997-07 80 p PDF (3.8 MB)
432 On two formal analyses of the Yahalom protocol Lawrence C. Paulson 1997-07 16 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
431 The MCPL programming manual and user guide Martin Richards 1997-07 70 p PDF (4.0 MB)
430 Video mail retrieval using voice: Report on topic spotting (Deliverable report on VMR task no. 6) G.J.F. Jones, J.T. Foote, et al. 1997-07 73 p PDF (5.0 MB)
429 Compilation and equivalence of imperative objects Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen 1997-06 64 p PS (0.2 MB)
DVI (0.1 MB)
428 Floating point verification in HOL Light: the exponential function John Harrison 1997-06 112 p PS (0.3 MB)
DVI (0.1 MB)
427 Proving Java type soundness Don Syme 1997-06 35 p PDF (2.4 MB)
426 Action selection methods using reinforcement learning Mark Humphrys 1997-06 PhD
195 p
PS (0.5 MB)
425 Should your specification language be typed? Leslie Lamport, Lawrence C. Paulson 1997-05 30 p PDF (0.3 MB)
424 Simplification with renaming: a general proof technique for tableau and sequent-based provers Fabio Massacci 1997-05 26 p DVI (0.0 MB)
423 Symbol grounding: Learning categorical and sensorimotor predictions for coordination in autonomous robots Karl F. MacDorman 1997-05 PhD
170 p
PDF (16.7 MB)
422 Using the BONITA primitives: a case study Antony Rowstron 1997-05 19 p PDF (2.0 MB)
421 An abstract dynamic semantics for C Michael Norrish 1997-05 31 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
420 Managing complex models for computer graphics Jonathan Mark Sewell 1997-04 PhD
206 p
PDF (14.3 MB)
419 Video-augmented environments James Quentin Stafford-Fraser 1997-04 PhD
91 p
PDF (2.4 MB)
418 Mechanized proofs for a recursive authentication protocol Lawrence C. Paulson 1997-03 30 p PDF (0.2 MB)
PS (0.1 MB)
417 Selective mesh refinement for interactive terrain rendering Peter J.C. Brown 1997-02 18 p PDF (2.7 MB)
416 DECLARE: a prototype declarative proof system for higher order logic Donald Syme 1997-02 25 p PDF (1.7 MB)
415 Application support for mobile computing Steven Leslie Pope 1997-02 PhD
145 p
PDF (12.0 MB)
414 A calculus for cryptographic protocols : The SPI calculus Martín Abadi, Andrew D. Gordon 1997-01 105 p PS (0.3 MB)
413 Mechanized proofs of security protocols: Needham-Schroeder with public keys Lawrence C. Paulson 1997-01 20 p PDF (0.1 MB)
PS (0.0 MB)
DVI (0.0 MB)
412 Observations on a linear PCF (preliminary report) G.M. Bierman 1997-01 30 p PDF (1.6 MB)
411 Formalising process calculi in Higher Order Logic Monica Nesi 1997-01 PhD
182 p
PDF (16.7 MB)
410 Proof style John Harrison 1997-01 22 p PS (0.1 MB)
DVI (0.0 MB)
409 Proving properties of security protocols by induction Lawrence C. Paulson 1996-12 24 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
408 Theorem proving with the real numbers John Robert Harrison 1996-11 PhD
147 p
PS (0.4 MB)
DVI (0.3 MB)
407 The L4 microkernel on Alpha : Design and implementation Sebastian Schoenberg 1996-09 51 p PS (0.1 MB)
406 Tool support for logics of programs Lawrence C. Paulson 1996-11 31 p PDF (0.3 MB)
PS (0.2 MB)
405 A tool to support formal reasoning about computer languages Richard J. Boulton 1996-11 21 p PS (0.1 MB)
DVI (0.0 MB)
404 Adaptive parallelism for computing on heterogeneous clusters Kam Hong Shum 1996-11 PhD
147 p
PDF (12.6 MB)
403 Devices in a multi-service operating system Paul Ronald Barham 1996-10 PhD
131 p
PS (1.6 MB)
DVI (0.1 MB)
402 Video mail retrieval using voice: report on collection of naturalistic requests and relevance assessments G.J.F. Jones, J.T. Foote, et al. 1996-09 21 p PDF (1.2 MB)
401 A classical linear λ-calculus Gavin Bierman 1996-07 41 p PDF (1.9 MB)
400 Monitoring the behaviour of distributed systems Scarlet Schwiderski 1996-07 PhD
161 p
PDF (1.0 MB)
399 OASIS: An open architecture for secure interworking services Richard Hayton 1996-06 PhD
102 p
PDF (0.9 MB)
398 Design and implementation of an autostereoscopic camera system N.A. Dodgson, J.R. Moore 1996-06 20 p PDF (0.3 MB)
397 Optimal routing in 2-jump circulant networks Borut Robič 1996-06 7 p PS (0.1 MB)
396 Generic automatic proof tools Lawrence C. Paulson 1996-05 28 p PDF (0.2 MB)
PS (0.1 MB)
395 Cut-elimination for full intuitionistic linear logic Torben Bräuner, Valeria de Paiva 1996-05 27 p PDF (1.4 MB)
394 A simple formalization and proof for the mutilated chess board Lawrence C. Paulson 1996-04 11 p PDF (0.1 MB)
PS (0.0 MB)
DVI (0.0 MB)
393 Performance management in ATM networks Simon Andrew Crosby 1996-04 PhD
215 p
PS (0.9 MB)
392 Decoding choice encodings Uwe Nestmann, Benjamin C. Pierce 1996-04 54 p PDF (3.7 MB)
391 Programming languages and dimensions Andrew John Kennedy 1996-04 PhD
149 p
PDF (0.9 MB)
390 Syn: a single language for specifiying abstract syntax tress, lexical analysis, parsing and pretty-printing Richard J. Boulton 1996-03 25 p PS (0.1 MB)
DVI (0.0 MB)
389 A proof checked for HOL Wai Wong 1996-03 165 p PDF (11.6 MB)
388 A unified approach to strictness analysis and optimising transformations P.N. Benton 1996-02 21 p PDF (1.7 MB)
387 Monitoring composite events in distributed systems Scarlet Schwiderski, Andrew Herbert, Ken Moody 1996-02 20 p PDF (1.7 MB)
386 Bisimilarity for a first-order calculus of objects with subtyping Andrew D. Gordon, Gareth D. Rees 1996-01 78 p
385 Performance evaluation of the Delphi machine Sanjay Saraswat 1995-12 PhD
187 p
384 Securing ATM networks Shaw-Cheng Chuang 1995-01 30 p PS (0.2 MB)
383 Management of replicated data in large scale systems Noha Adly 1995-11 PhD
182 p
PDF (18.2 MB)
382 Synthetic image generation for a multiple-view autostereo display Oliver M. Castle 1995-10 PhD
184 p
381 Rendering for free form deformations Uwe Michael Nimscheck 1995-10 PhD
151 p
PDF (29.1 MB)
380 Quality-of-Service issues in networking environments Burkhard Stiller 1995-09 68 p PS (0.2 MB)
379 Proceedings of the First Isabelle Users Workshop Lawrence Paulson 1995-09 265 p
378 Performance evaluation of HARP: a hierarchical asynchronous replication protocol for large scale system Noha Adly 1995-08 94 p PS (0.3 MB)
377 Mechanising set theory: cardinal arithmetic and the axiom of choice Larry Paulson, Krzysztof Grabczewski 1995-07 33 p PDF (0.3 MB)
PS (0.1 MB)
376 The structure of a multi-service operating system Timothy Roscoe 1995-08 PhD
113 p
PS (0.4 MB)
375 Restructuring virtual memory to support distributed computing environments Feng Huang 1995-07 PhD
145 p
PDF (13.0 MB)
374 A framework for QoS updates in a networking environment Burkhard Stiller 1995-07 PS (0.1 MB)
373 Natural-language processing and requirements specifications Benjamín Macías, Stephen G. Pulman 1995-07 73 p PDF (4.9 MB)
372 A brief history of mobile telephony Stefan G. Hild 1995-01 19 p PDF (1.6 MB)
371 LIMINF convergence in Ω-categories Kim Ritter Wagner 1995-06 28 p PDF (1.9 MB)
370 A package for non-primitive recursive function definitions in HOL Sten Agerholm 1995-07 36 p PDF (2.1 MB)
369 A comparison of HOL-ST and Isabelle/ZF Sten Agerholm 1995-07 23 p PDF (1.8 MB)
368 CogPiT – configuration of protocols in TIP Burkhard Stiller 1995-06 73 p PS (0.2 MB)
367 Categorical logic Andrew M. Pitts 1995-05 94 p PS (0.3 MB)
DVI (0.1 MB)
366 Retrieving spoken documents: VMR Project experiments K. Spärck Jones, G.J.F. Jones, et al. 1995-05 28 p PDF (3.0 MB)
365 Computational types from a logical perspective I P.N. Benton, G.M. Bierman, V.C.V. de Paiva 1995-05 19 p PDF (1.1 MB)
364 The Church-Rosser theorem in Isabelle: a proof porting experiment Ole Rasmussen 1995-04 27 p PS (0.1 MB)
363 Names and higher-order functions Ian Stark 1995-04 PhD
140 p
PS (0.3 MB)
DVI (0.2 MB)
362 W-learning: competition among selfish Q-learners Mark Humphrys 1995-04 30 p PS (0.1 MB)
361 Explicit network scheduling Richard John Black 1995-04 PhD
121 p
PS (0.3 MB)
360 On the calculation of explicit polymetres W.F. Clocksin 1995-03 12 p PDF (0.8 MB)
359 A case study of co-induction in Isabelle Jacob Frost 1995-02 48 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.1 MB)
358 Multithreaded processor design Simon William Moore 1995-02 PhD
125 p
PDF (10.0 MB)
357 Seven more myths of formal methods Jonathan P. Bowen, Michael G. Hinchey 1994-12 12 p PDF (1.2 MB)
356 Simple, proven approaches to text retrieval S.E. Robertson, K. Spärck Jones 1994-12 8 p PDF (0.2 MB)
355 Two cryptographic notes David Wheeler, Roger Needham 1994-11 6 p PDF (0.4 MB)
354 Formalising a model of the λ-calculus in HOL-ST Sten Agerholm 1994-11 31 p PDF (1.5 MB)
353 Merging HOL with set theory Mike Gordon 1994-11 40 p PDF (1.5 MB)
352 A mixed linear and non-linear logic: proofs, terms and models P.N. Benton 1994-10 65 p PDF (4.7 MB)
351 Handling realtime traffic in mobile networks Subir Kumar Biswas 1994-09 PhD
198 p
PS (0.5 MB)
350 Ten commandments of formal methods Jonathan P. Bowen, Michael G. Hinchey 1994-09 18 p PDF (1.7 MB)
349 A HOL interpretation of Noden Brian Graham 1994-09 78 p
348 Integrated sound synchronisation for computer animation Jane Louise Hunter 1994-08 PhD
248 p
347 Reflections on TREC Karen Spärck Jones 1994-07 35 p PS (0.1 MB)
DVI (0.1 MB)
346 On intuitionistic linear logic G.M. Bierman 1994-08 PhD
191 p
PDF (12.6 MB)
345 A proof environment for arithmetic with the Omega rule Siani L. Baker 1994-08 17 p PDF (1.4 MB)
344 The contour tree image encoding technique and file format Martin John Turner 1994-07 PhD
154 p
PDF (169.4 MB)
342 An architecture for distributed user interfaces Stephen Martin Guy Freeman 1994-07 PhD
127 p
PDF (8.1 MB)
341 Presentation support for distributed multimedia applications John Bates 1994-06 140 p PS (0.8 MB)
340 Operating system support for quality of service Eoin Andrew Hyden 1994-06 PhD
102 p
PDF (1.1 MB)
339 Belief revision and dialogue management in information retrieval Brian Logan, Steven Reece, et al. 1994-05 227 p PDF (13.3 MB)
338 A new approach to implementing atomic data types Zhixue Wu 1994-05 PhD
170 p
PDF (10.2 MB)
337 Efficiency in a fully-expansive theorem prover Richard John Boulton 1994-05 PhD
126 p
DVI (0.2 MB)
336 Towards a proof theory of rewriting: the simply-typed 2-λ calculus Barnaby P. Hilken 1994-05 28 p PDF (1.7 MB)
335 Video mail retrieval using voice: report on keyword definition and data collection (deliverable report on VMR task No. 1) G.J.F. Jones, J.T. Foote, et al. 1994-04 38 p PDF (1.7 MB)
334 A concrete final coalgebra theorem for ZF set theory Lawrence C. Paulson 1994-05 21 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
333 What is a categorical model of intuitionistic linear logic? G.M. Bierman 1994-04 15 p PDF (0.9 MB)
332 Distributed computing with objects David Martin Evers 1994-03 PhD
154 p
PDF (9.1 MB)
331 HPP: a hierarchical propagation protocol for large scale replication in wide area networks Noha Adly, Akhil Kumar 1994-03 24 p PDF (1.7 MB)
330 Interacting with paper on the DigitalDesk Pierre David Wellner 1994-03 PhD
96 p
PDF (3.8 MB)
329 The formal verification of the Fairisle ATM switching element Paul Curzon 1994-03 105 p PDF (6.7 MB)
328 The formal verification of the Fairisle ATM switching element: an overview Paul Curzon 1994-03 46 p PDF (4.7 MB)
327 A new application for explanation-based generalisation within automated deduction Siani L. Baker 1994-02 18 p PDF (1.5 MB)
326 A modular and extensible network storage architecture Sai-Lai Lo 1994-01 PhD
147 p
PS (0.3 MB)
325 The temporal properties of English conditionals and modals Richard Crouch 1994-01 PhD
248 p
PDF (16.2 MB)
324 Verifying modular programs in HOL J. von Wright 1994-01 25 p PDF (1.3 MB)
323 Representing higher-order logic proofs in HOL J. von Wright 1994-01 28 p PDF (1.5 MB)
322 Supporting distributed realtime computing Guangxing Li 1993-12 PhD
113 p
PDF (10.7 MB)
321 Relational properties of domains Andrew M. Pitts 1993-12 38 p PS (0.2 MB)
320 A fixedpoint approach to implementing (co)inductive definitions (updated version) Lawrence C. Paulson 1995-07 29 p PDF (0.2 MB)
DVI (0.0 MB)
319 A workstation architecture to support multimedia Mark David Hayter 1993-11 PhD
99 p
PS (0.7 MB)
318 A method of program refinement Jim Grundy 1993-11 PhD
207 p
PS (0.3 MB)
317 Femto-VHDL: the semantics of a subset of VHDL and its embedding in the HOL proof assistant John Peter Van Tassel 1993-11 PhD
122 p
PDF (7.3 MB)
316 The Compleat LKB Ann Copestake 1993-08 126 p PS (0.3 MB)
315 Strategy generation and evaluation for meta-game playing Barney Darryl Pell 1993-11 PhD
289 p
PS (0.4 MB)
314 Practical unification-based parsing of natural language John Andrew Carroll (1993) PhD
173 p
PS (0.3 MB)
313 Proof by pointing Yves Bertot, Gilles Kahn, Laurent Théry 1993-10 27 p PDF (1.7 MB)
312 Set theory for verification: II : Induction and recursion Lawrence C. Paulson 1993-09 46 p PDF (0.3 MB)
311 A verified Vista implementation Paul Curzon 1993-09 56 p PDF (5.6 MB)
310 HARP: a hierarchical asynchronous replication protocol for massively replicated systems Noha Adly 1993-08 34 p PS (0.1 MB)
309 Strictness analysis of lazy functional programs Peter Nicholas Benton 1993-08 PhD
154 p
PDF (13.3 MB)
308 A case study of co-induction in Isabelle HOL Jacob Frost 1993-08 27 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
307 Natural language processing for information retrieval David D. Lewis, Karen Spärck Jones 1993-07 22 p PS (0.1 MB)
306 Recording HOL proofs Wai Wong 1993-07 57 p PDF (3.8 MB)
305 Strong normalisation for the linear term calculus P.N. Benton 1993-07 13 p PDF (0.6 MB)
304 Co-induction and co-recursion in higher-order logic Lawrence C. Paulson 1993-07 35 p PDF (0.3 MB)
PS (0.1 MB)
DVI (0.1 MB)
303 Drawing trees — a case study in functional programming Andrew Kennedy 1993-06 9 p PDF (0.6 MB)
302 Logic programming for general game-playing Barney Pell 1993-06 15 p PS (0.0 MB)
301 The dual-level validation concurrency control method Zhixue Wu, Ken Moody, Jean Bacon 1993-06 24 p PDF (1.6 MB)
300 Formal verification of VIPER’s ALU Wai Wong 1993-04 78 p PDF (5.4 MB)
299 Pragmatic reasoning in bridge Bjorn Gamback, Manny Rayner, Barney Pell 1993-04 23 p PS (0.1 MB)
298 Multicast in the asynchronous transfer mode environment John Matthew Simon Doar 1993-04 PhD
168 p
PS (0.5 MB)
297 Categorical abstract machines for higher-order typed lambda calculi Eike Ritter 1993-04 PhD
149 p
PDF (11.5 MB)
296 A persistent programming language for multimedia databases in the OPERA project Z. Wu, K. Moody, J. Bacon 1993-04 9 p PDF (1.0 MB)
295 OPERA : Storage and presentation support for multimedia applications in a distributed, ATM network environment Jean Bacon, John Bates, et al. 1993-04 12 p PDF (1.0 MB)
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p PDF (0.9 MB)
293 Objects and transactions for modelling distributed applications: concurrency control and commitment Jean Bacon, Ken Moody 1993-04 39 p PDF (3.5 MB)
292 Synchronisation services for digital continuous media Cormac John Sreenan 1993-03 PhD
123 p
PS (0.3 MB)
291 Evaluating natural language processing systems J.R. Galliers, K. Spärck Jones 1993-02 187 p PS (0.2 MB)
290 Discourse modelling for automatic summarising Karen Spärck Jones 1993-02 30 p PDF (1.9 MB)
289 The semantics of noun phrase anaphora David Alan Howard Elworthy 1993-02 PhD
191 p
PDF (13.9 MB)
288 Cut-free sequent and tableau systems for propositional Diodorean modal logics Rajeev Gore 1993-02 19 p PDF (1.3 MB)
287 A mechanised definition of Silage in HOL Andrew D. Gordon 1993-02 28 p DVI (0.0 MB)
286 Isabelle’s object-logics Lawrence C. Paulson 1993-02 161 p DVI (0.2 MB)
285 Functional programming and input/output Andrew Donald Gordon 1993-02 PhD
163 p
284 The Alvey Natural Language Tools grammar (4th Release) Claire Grover, John Carroll, Ted Briscoe 1993-01 260 p
283 The Isabelle reference manual Lawrence C. Paulson 1993-02 78 p DVI (0.2 MB)
282 Pegasus – Operating system support for distributed multimedia systems Ian M. Leslie, Derek McAuley, Sape J. Mullender 1992-12 14 p
281 Pegasus project description Sape J. Mullender, Ian M. Leslie, Derek McAuley 1992-09 23 p
280 Introduction to Isabelle Lawrence C. Paulson 1993-01 61 p DVI (0.1 MB)
279 The transition assertions specification method Victor A. Carreño 1992-12 18 p PDF (1.2 MB)
278 A formalization of the process algebra CCS in high order logic Monica Nesi (1992) 42 p PDF (2.1 MB)
277 METAGAME in symmetric chess-like games Barney Pell (1992) 30 p PS (0.1 MB)
276 METAGAME: a new challenge for games and learning Barney Pell (1992) 15 p PS (0.0 MB)
275 Exploratory learning in the game of GO Barney Pell (1992) 18 p PS (0.0 MB)
274 Of what use is a verified compiler specification? Paul Curzon 1992-11 23 p PDF (1.8 MB)
273 TouringMachines: an architecture for dynamic, rational, mobile agents Innes A. Ferguson 1992-11 PhD
206 p
PDF (2.0 MB)
PS (0.4 MB)
272 Interactive program derivation Martin David Coen 1992-11 PhD
100 p
PDF (0.6 MB)
DVI (0.1 MB)
271 Set theory as a computational logic: I. from foundations to functions Lawrence C. Paulson 1992-11 28 p PDF (0.3 MB)
DVI (0.0 MB)
270 Designing a universal name service Chaoying Ma (1992) PhD
133 p
PDF (6.8 MB)
269 Optimising compilation Alan Mycroft, Arthur Norman 1992-10 23 p PDF (2.2 MB)
268 Network file server design for continuous media Paul W. Jardetzky 1992-10 PhD
101 p
PS (0.3 MB)
267 Untyped strictness analysis Christine Ernoult, Alan Mycroft 1992-10 13 p PDF (0.9 MB)
266 Automatic exploitation of OR-parallelism in Prolog Carole Klein 1992-09 18 p PDF (0.8 MB)
265 Reasoning with inductively defined relations in the HOL theorem prover Juanito Camilleri, Tom Melham 1992-08 49 p
264 CCS with environmental guards Juanito Camilleri 1992-08 19 p PDF (1.2 MB)
263 The Lazy Lambda Calculus: an investigation into the foundations of functional programming C.-H. Luke Ong 1992-08 PhD
256 p
262 Term assignment for intuitionistic linear logic (preliminary report) Nick Benton, Gavin Bierman, Valeria de Paiva 1992-08 57 p PDF (1.9 MB)
261 Image resampling Neil Anthony Dodgson 1992-08 PhD
264 p
PDF (5.1 MB)
260 Local computation of alternating fixed-points Henrik Reif Anderson 1992-06 21 p PDF (1.4 MB)
259 Full abstraction in the Lazy Lambda Calculus Samson Abramsky, C.-H. Luke Ong (1992) 104 p
258 Two papers on ATM networks David J. Greaves, Derek McAuley, Leslie J. French 1992-05 22 p PDF (1.7 MB)
257 Cut-free sequent and tableau systems for propositional normal modal logics Rajeev Prakhakar Goré 1992-05 160 p PDF (9.7 MB)
256 MCPL programming manual Martin Richards 1992-05 32 p PDF (1.5 MB)
255 The formal verification of hard real-time systems Rachel Mary Cardell-Oliver 1992 PhD
151 p
254 A HOL semantics for a subset of ELLA Richard J. Boulton 1992-04 104 p DVI (0.1 MB)
253 The (other) Cambridge ACQUILEX papers Antonio Sanfilippo (1992) 141 p
252 A co-induction principle for recursively defined domains Andrew M. Pitts (1992) 25 p PS (0.1 MB)
251 Multipoint digital video communications Xiaofeng Jiang 1992-04 PhD
124 p
PDF (19.7 MB)
250 TouringMachines: autonomous agents with attitudes Innes A. Ferguson 1992-04 19 p PS (0.1 MB)
249 A formalisation of the VHDL simulation cycle John P. Van Tassel 1992-03 24 p PDF (1.2 MB)
248 On efficiency in theorem provers which fully expand proofs into primitive inferences Richard J. Boulton 1992-02 23 p DVI (0.0 MB)
247 Programming metalogics with a fixpoint type Roy Luis Crole 1992-02 PhD
164 p
PDF (7.5 MB)
246 A relevance-based utterance processing system Victor Poznański 1992-02 PhD
295 p
PDF (18.5 MB)
245 System support for multi-service traffic Michael J. Dixon 1992-01 PhD
108 p
PDF (7.3 MB)
244 A mechanized theory of the π-calculus in HOL T.F. Melham 1992-01 31 p PDF (2.0 MB)
243 Automating the librarian: a fundamental approach using belief revision Alison Cawsey, Julia Galliers, et al. 1992-01 39 p PDF (3.1 MB)
242 An object-oriented approach to virtual memory management Glenford Ezra Mapp 1992-01 PhD
150 p
PDF (6.6 MB)
241 Learning in large state spaces with an application to biped robot walking Thomas Ulrich Vogel 1991-12 PhD
204 p
PDF (13.9 MB)
240 Symbolic compilation and execution of programs by proof: a case study in HOL Juanito Camilleri 1991-12 31 p PDF (1.9 MB)
239 Planning multisentential English text using communicative acts Mark Thomas Maybury 1991-12 PhD
329 p
PDF (26.8 MB)
238 Proceedings of the ACQUILEX Workshop on Default Inheritance in the lexicon Ted Briscoe, Ann Copestake, Valeria de Paiva 1991-10 180 p PDF (18.9 MB)
237 Computing presuppositions in an incremantal language processing system Derek G. Bridge (1991) PhD
212 p
PDF (25.0 MB)
236 Using knowledge of purpose and knowledge of structure as a basis for evaluating the behaviour of mechanical systems John Anthony Bradshaw (1991) PhD
153 p
235 Modelling and image generation Heng Wang (1991) PhD
145 p
PDF (10.6 MB)
234 Two tutorial papers: Information retrieval & Thesaurus Karen Spärck Jones 1991-08 31 p PDF (2.3 MB)
233 A development environment for large natural language grammars John Carroll, Ted Briscoe, Claire Grover 1991-07 65 p
232 Mechanising set theory Francisco Corella 1991-07 PhD
217 p
PDF (9.6 MB)
231 Managing the order of transactions in widely-distributed data systems Raphael Yahalom 1991-08 PhD
133 p
230 Proceedings of the Second Belief Representation and Agent Architectures Workshop (BRAA ’91) J. Galliers 1991-08 255 p
229 Abstraction of image and pixel : The thistle display system David J. Brown 1991-08 PhD
197 p
228 The desk area network Mark Hayter, Derek McAuley 1991-05 11 p PS (0.0 MB)
227 Priority in process calculi Juanito Albert Camilleri 1991-06 PhD
203 p
226 A new approach for improving system availability Kwok-yan Lam 1991-06 PhD
108 p
225 Categorical multirelations, linear logic and petri nets (draft) Valeria de Paiva 1991-05 29 p PDF (1.2 MB)
224 Generalised probabilistic LR parsing of natural language (corpora) with unification-based grammars Ted Briscoe, John Carroll (1991) 45 p PDF (4.0 MB)
223 Shallow processing and automatic summarising: a first study Philip Gladwin, Stephen Pulman, Karen Spärck Jones 1991-05 65 p PDF (2.9 MB)
222 Extensions to coloured petri nets and their application to protocols Jonathan Billington (1991) PhD
190 p
PDF (16.1 MB)
221 Transforming axioms for data types into sequential programs Robert Milne (1991) 44 p PDF (2.2 MB)
220 A distributed architecture for multimedia communication systems Cosmos Andrea Nicolaou (1991) PhD
192 p
PDF (19.2 MB)
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 56 p PDF (3.4 MB)
218 Higher-order critical pairs Tobias Nipkow 1991-04 15 p PDF (1.0 MB)
217 Dynamic bandwidth management Bhaskar Ramanathan Harita (1991) PhD
160 p
PDF (14.9 MB)
216 Exploiting OR-parallelism in Prolog using multiple sequential machines Carole Susan Klein (1991) PhD
250 p
PDF (20.6 MB)
215 A structured approach to the verification of low level microcode Paul Curzon (1991) PhD
265 p
PDF (12.0 MB)
214 Integrating knowledge of purpose and knowledge of structure for design evaluation J.A. Bradshaw, R.M. Young 1991-02 20 p PDF (1.3 MB)
213 The Dialectica categories Valeria Correa Vaz de Paiva 1991-01 PhD
82 p
PDF (3.5 MB)
212 A distributed and-or parallel Prolog network K.L. Wrench 1990-12 82 p PDF (4.7 MB)
211 The role of artificial intelligence in information retrieval Karen Spärck Jones 1990-11 13 p PDF (1.2 MB)
210 Higher-order unification, polymorphism, and subsorts Tobias Nipkow (1990) 15 p PDF (1.1 MB)
209 Efficient memory-based learning for robot control Andrew William Moore 1990-11 PhD
248 p
PDF (11.3 MB)
208 Categorical combinators for the calculus of constructions Eike Ritter 1990-10 43 p PDF (2.8 MB)
207 Video replay in computer animation Stuart Philip Hawkins 1990-10 PhD
161 p
PDF (18.3 MB)
206 Formal verification of real-time protocols using higher order logic Rachel Cardell-Oliver 1990-08 36 p PDF (1.8 MB)
205 Logic programming, functional programming and inductive definitions Lawrence C. Paulson, Andrew W. Smith (1990) 29 p PDF (0.2 MB)
DVI (0.0 MB)
204 New foundations for fixpoint computations: FIX-hyperdoctrines and the FIX-logic Roy L. Crole, Andrew M. Pitts 1990-08 37 p PS (0.1 MB)
203 Subtyping in Ponder (preliminary report) Valeria C.V. de Paiva 1990-08 35 p PDF (1.5 MB)
202 Three-dimensional integrated circuit layout Andrew Charles Harter 1990-08 PhD
179 p
PDF (11.7 MB)
201 Formalizing abstraction mechanisms for hardware verification in higher order logic Thomas Frederick Melham 1990-08 PhD
233 p
PDF (1.7 MB)
200 Type classes and overloading resolution via order-sorted unification Tobias Nipkow, Gregor Snelting 1990-08 16 p PDF (1.3 MB)
199 The HOL verification of ELLA designs Richard Boulton, Mike Gordon, et al. 1990-08 22 p PS (0.1 MB)
198 Evaluation Logic Andrew M. Pitts 1990-08 31 p PS (0.1 MB)
197 The semantics and implementation of aggregates : or : how to express concurrency without destroying determinism Thomas Clarke 1990-07 25 p PDF (1.8 MB)
196 The semantics of VHDL with Val and Hol: towards practical verification tools John Peter Van Tassell 1990-06 77 p PDF (4.3 MB)
195 Multi-level verification of microprocessor-based systems Jeffrey J. Joyce 1990-05 PhD
163 p
PDF (11.3 MB)
194 Proceedings of the First Belief Representation and Agent Architectures Workshop Julia Rose Galliers 1990-03 199 p PDF (6.8 MB)
193 Belief revision and a theory of communication Julia Rose Galliers 1990-05 30 p PDF (2.2 MB)
192 Designing a theorem prover Lawrence C. Paulson 1990-05 57 p PDF (0.3 MB)
DVI (0.1 MB)
191 An architecture for real-time multimedia communications systems Cosmos Nicolaou 1990-02 30 p PDF (1.3 MB)
190 Some notes on mass terms and plurals Ann Copestake 1990-01 65 p PS (0.1 MB)
189 Isabelle tutorial and user’s manual Lawrence C. Paulson, Tobias Nipkow 1990-01 142 p PDF (0.5 MB)
DVI (0.1 MB)
188 Specification of computer architectures: a survey and annotated bibliography Timothy E. Leonard 1990-01 42 p PDF (2.9 MB)
187 Natural language interfaces to databases Ann Copestake, Karen Spärck Jones 1989-09 36 p PS (0.1 MB)
186 Protocol design for high speed networks Derek Robert McAuley 1990-01 PhD
100 p
PS (0.3 MB)
185 Logics of domains Guo Qiang Zhang 1989-12 PhD
250 p
PDF (17.5 MB)
184 Site interconnection and the exchange architecture David Lawrence Tennenhouse 1989-10 PhD
225 p
PDF (15.6 MB)
183 The specification and verification of sliding window protocols in higher order logic Rachel Cardell-Oliver 1989-10 25 p PDF (1.6 MB)
182 The theory and implementation of a bidirectional question answering system John M. Levine, Lee Fedder 1989-10 27 p PDF (1.5 MB)
181 Proof transformations for equational theories Tobias Nipkow 1989-09 17 p PDF (1.1 MB)
180 Formal verification of data type refinement: Theory and practice Tobias Nipkow 1989-09 31 p PDF (2.1 MB)
179 Automating Squiggol Ursula Martin, Tobias Nipkow 1989-09 16 p PDF (1.0 MB)
178 Totally verified systems: linking verified software to verified hardware Jeffrey J. Joyce 1989-09 25 p PDF (1.5 MB)
177 Experimenting with Isabelle in ZF Set Theory P.A.J. Noel 1989-09 40 p PDF (2.2 MB)
176 Implementing aggregates in parallel functional languages T.J.W. Clarke 1989-08 13 p PDF (1.0 MB)
175 A formulation of the simple theory of types (for Isabelle) Lawrence C. Paulson 1989-08 32 p PDF (0.2 MB)
DVI (0.0 MB)
174 General theory relating to the implementation of concurrent symbolic computation James Thomas Woodchurch Clarke 1989-08 PhD
113 p
PDF (8.7 MB)
173 Programming in temporal logic Roger William Stephen Hale 1989-07 PhD
182 p
PDF (10.2 MB)
172 A theoretical framework for computer models of cooperative dialogue, acknowledging multi-agent conflict Julia Rose Galliers 1989-07 226 p PDF (13.3 MB)
171 Some types with inclusion properties in ∀, →, μ Jon Fairbairn 1989-06 10 p PDF (0.2 MB)
170 Ordered rewriting and confluence Ursula Martin, Tobias Nipkow 1989-05 18 p PDF (1.3 MB)
169 Filing in a heterogeneous network Andrew Franklin Seaborne 1989-04 PhD
131 p
PDF (7.7 MB)
168 Distributed computing with a processor bank J.M. Bacon, I.M. Leslie, R.M. Needham 1989-04 15 p PDF (0.6 MB)
167 A verified compiler for a verified microprocessor Jeffrey J. Joyce 1989-03 67 p
166 Evolution of operating system structures Jean Bacon 1989-03 28 p PDF (1.6 MB)
165 Fast packet switching for integrated services Peter Newman 1989-03 PhD
145 p
PDF (10.4 MB)
164 A matrix key distribution system Li Gong, David J. Wheeler 1988-10 20 p PDF (1.0 MB)
163 Inference in a natural language front end for databases Ann Copestake, Karen Spärck Jones 1989-02 87 p PDF (0.5 MB)
162 The Alvey natural language tools grammar (2nd Release) Claire Grover, Ted Briscoe, et al. 1989-04 90 p PDF (7.5 MB)
161 Papers on Poly/ML D.C.J. Matthews 1989-02 150 p PDF (11.5 MB)
160 PFL+: A Kernal Scheme for Functions I/O Andrew Gordon 1989-02 26 p PDF (1.4 MB)
159 Non-trivial power types can’t be subtypes of polymorphic types Andrew M. Pitts 1989-01 12 p PS (0.1 MB)
158 Tailoring output to the user: What does user modelling in generation mean? Karen Spärck Jones 1988-08 21 p PDF (1.6 MB)
157 Introducing a priority operator to CCS Juanito Camilleri 1989-01 19 p PDF (0.8 MB)
156 Events and VP modifiers Steve Pulman 1989-01 10 p PDF (0.6 MB)
155 Computational morphology of English S.G. Pulman, G.J. Russell, et al. 1989-01 15 p PDF (1.0 MB)
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p PDF (0.6 MB)
153 Efficient data sharing Michael Burrows 1988-12 PhD
99 p
PDF (6.0 MB)
152 Motion development for computer animation Andrew Mark Pullen 1988-11 PhD
163 p
PDF (11.5 MB)
151 Formalising an integrated circuit design style in higher order logic Inderpreet-Singh Dhingra 1988-11 PhD
195 p
PDF (9.0 MB)
150 Simulation as an aid to verification using the HOL theorem prover Albert John Camilleri 1988-10 23 p PDF (1.7 MB)
149 Improving security and performance for capability systems Paul Ashley Karger 1988-10 PhD
273 p
PDF (1.3 MB)
PS (0.5 MB)
148 Extending coloured petri nets Jonathan Billington 1988-09 82 p PDF (3.5 MB)
147 Formal specification and verification of microprocessor systems Jeffrey Joyce 1988-09 24 p PDF (1.2 MB)
146 Automating recursive type definitions in higher order logic Thomas F. Melham 1988-09 64 p PDF (5.6 MB)
145 Mechanizing programming logics in higher order logic Michael J.C. Gordon 1988-09 55 p PDF (0.5 MB)
144 An operational semantics for occam Juanito Camilleri 1988-08 27 p PDF (0.7 MB)
143 Experience with Isabelle : A generic theorem prover Lawrence C. Paulson 1988-08 20 p PDF (0.2 MB)
DVI (0.0 MB)
142 A fast packet switch for the integrated services backbone network Peter Newman 1988-07 24 p PDF (1.3 MB)
141 Reliable management of voice in a distributed system Roy Want 1988-07 PhD
127 p
PDF (7.6 MB)
140 Executing behavioural definitions in higher order logic Albert John Camilleri 1988-07 PhD
183 p
PDF (8.1 MB)
139 Petri net theory: a survey Paul R. Manson 1988-06 77 p PDF (3.3 MB)
138 Authentication: a practical study in belief and action Michael Burrows, Martín Abadi, Roger Needham 1988-06 19 p PDF (1.0 MB)
137 Mass terms and plurals: from linguistic theory to natural language processing F.V. Hasle 1988-06 171 p PDF (5.7 MB)
136 Formal specification and verification of asynchronous processes in higher-order logic Jeffrey J. Joyce 1988-06 45 p PDF (2.3 MB)
135 Using recursive types to reason about hardware in higher order logic Thomas F. Melham 1988-05 30 p PDF (1.9 MB)
134 Correctness properties of the Viper black model: the second level Avra Cohn 1988-05 114 p PDF (7.0 MB)
133 A preliminary users manual for Isabelle Lawrence C. Paulson 1988-05 81 p PDF (0.3 MB)
DVI (0.1 MB)
132 Reasoning about the function and timing of integrated circuits with Prolog and temporal logic Miriam Ellen Leeser 1988-04 PhD
151 p
PDF (6.7 MB)
131 Architecture problems in the construction of expert systems for document retrieval Karen Spärck Jones 1986-12 28 p PDF (1.3 MB)
130 The foundation of a generic theorem prover Lawrence C Paulson 1988-03 44 p PDF (0.2 MB)
DVI (0.1 MB)
129 A methodology for automated design of computer instruction sets Jeremy Peter Bennett 1988-03 PhD
147 p
PDF (5.8 MB)
128 Debugging concurrent and distributed programs Robert Charles Beaumont Cooper 1988-02 PhD
111 p
PDF (5.9 MB)
127 A development environment for large natural language grammars John Carroll, Bran Boguraev, et al. 1988-02 44 p PDF (2.1 MB)
126 Reasoning about the function and timing of integrated circuits with Prolog and temporal logic M.E. Leeser 1988-02 50 p PDF (2.6 MB)
125 An operational semantics for Occam Juanito Camilleri 1988-02 24 p PDF (0.7 MB)
124 Formal verification of basic memory devices John Herbert 1988-02 46 p PDF (1.6 MB)
123 Case study of the Cambridge Fast Ring ECL chip using HOL John Herbert 1988-02 38 p PDF (1.4 MB)
122 Temporal abstraction of digital designs John Herbert 1988-02 34 p PDF (1.4 MB)
121 A high-level petri net specification of the Cambridge Fast Ring M-access service Jonathan Billington 1987-12 31 p PDF (1.5 MB)
120 Block encryption D. Wheeler 1987-11 4 p PDF (0.4 MB)
119 Pilgrim: a debugger for distributed systems Robert Cooper 1987-07 19 p PDF (1.0 MB)
118 Material concerning a study of cases B.K. Boguraev, K. Spärck Jones 1987-05 31 p PDF (1.4 MB)
117 Distributed computing with RPC: the Cambridge approach J.M. Bacon, K.G. Hamilton 1987-10 15 p PDF (1.0 MB)
116 Domain theoretic models of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-09 52 p PDF (2.8 MB)
115 Formal validation of an integrated circuit design style I.S. Dhingra 1987-08 29 p PDF (1.2 MB)
114 An architecture for integrated services on the local area network Stephen Ades 1987-09 PhD
166 p
PDF (11.5 MB)
113 The representation of logics in higher-order logic Lawrence C. Paulson 1987-08 29 p PDF (1.3 MB)
112 Reducing thrashing by adaptive backtracking D.A. Wolfram 1987-08 15 p PDF (0.7 MB)
111 Realism about user modelling K. Spärck Jones 1987-06 32 p PDF (1.9 MB)
110 Relating two models of hardware Glynn Winskel 1987-07 16 p PDF (0.8 MB)
109 Hardware verification of VLSI regular structures Jeffrey Joyce 1987-07 20 p PDF (0.9 MB)
108 Workstation design for distributed computing Andrew John Wilkes 1987-06 PhD
179 p
PDF (7.2 MB)
107 DI-domains as a model of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-05 19 p PDF (0.8 MB)
106 Abstraction mechanisms for hardware verification Thomas F. Melham 1987-05 26 p PDF (1.3 MB)
105 A compositional model of MOS circuits Glynn Winskel 1987-04 25 p PDF (1.3 MB)
104 A proof of correctness of the Viper microprocessor: the first level Avra Cohn 1987-01 46 p PDF (2.3 MB)
103 HOL : A proof generating system for higher-order logic Mike Gordon 1987-01 56 p PDF (3.2 MB)
102 A persistent storage system for Poly and ML David C.J. Matthews 1987-01 16 p PDF (0.8 MB)
101 Binary routing networks David Russel Milway 1986-12 PhD
131 p
PDF (7.9 MB)
100 Proving a computer correct in higher order logic Jeff Joyce, Graham Birtwistle, Mike Gordon 1986-12 57 p PDF (3.5 MB)
99 An overview of the Poly programming language David C.J. Matthews 1986-08 11 p PDF (0.5 MB)
98 Power-domains, modalities and the Vietoris monad E. Robinson 1986-10 16 p PDF (1.1 MB)
97 A study on abstract interpretation and “validating microcode algebraically” Alan Mycroft 1986-10 22 p PDF (1.2 MB)
96 Models and logic of MOS circuits : Lectures for the Marktoberdorf Summerschool, August 1986 Glynn Winskel 1986-10 47 p PDF (1.8 MB)
95 Event structures : Lecture notes for the Advanced Course on Petri Nets Glynn Winskel 1986-07 69 p PDF (4.0 MB)
94 A mechanized proof of correctness of a simple counter Avra Cohn, Mike Gordon 1986-06 80 p
93 Automated design of an instruction set for BCPL J.P. Bennett 1986-06 56 p
92 Implementation and programming techniques for functional languages Stuart Charles Wray 1986-06 PhD
117 p
PDF (4.4 MB)
91 Hardware verification using higher-order logic Albert Camilleri, Mike Gordon, Tom Melham 1986-09 25 p PDF (1.3 MB)
90 The Cambridge Fast Ring networking system (CFR) Andy Hopper, Roger M. Needham 1986-06 25 p PDF (0.6 MB)
89 Making form follow function : An exercise in functional programming style Jon Fairbairn 1986-06 9 p PDF (0.4 MB)
88 A shallow processing approach to anaphor resolution David Maclean Carter 1986-05 PhD
233 p
PDF (16.8 MB)
87 Computer-aided type face design Kathleen Anne Carter 1986-05 PhD
172 p
PDF (16.5 MB)
86 The Entity System: an object based filing system Stephen Christopher Crawley 1986-04 PhD
120 p
PDF (6.5 MB)
85 Category theory and models for parallel computation Glynn Winskel 1986-04 16 p PDF (1.0 MB)
84 BSPL: a language for describing the behaviour of synchronous hardware Martin Richards 1986-04 56 p
83 Operating system design for large personal workstations Ian David Wilson (1985) PhD
203 p
PDF (13.8 MB)
82 Natural deduction proof as higher-order resolution Lawrence C. Paulson 1985-12 25 p PDF (0.2 MB)
DVI (0.0 MB)
81 The implementation of functional languages using custom hardware William Robert Stoye 1985-12 PhD
151 p
PDF (7.2 MB)
80 Interactive theorem proving with Cambridge LCF : A user’s manual Lawrence C. Paulson 1985-11 140 p
79 Petri nets, algebras and morphisms Glynn Winskel (1985) 38 p PDF (2.1 MB)
78 A complete proof system for SCCS with model assertions Glynn Winskel 1985-09 23 p PDF (1.0 MB)
77 Why higher-order logic is a good formalisation for specifying and verifying hardware Mike Gordon 1985-09 28 p PDF (0.9 MB)
76 Preserving abstraction in concurrent programming R.C.B. Cooper, K.G. Hamilton 1985-08 16 p PDF (0.8 MB)
75 Design and implementation of a simple typed language based on the lambda-calculus Jon Fairbairn 1985-05 PhD
107 p
PDF (0.6 MB)
74 Hardware verification by formal proof Mike Gordon 1985-08 6 p PDF (0.4 MB)
73 Resource management in a distributed computing system Daniel Hammond Craft (1985) PhD
116 p
PDF (6.6 MB)
72 Logic programming and the specification of circuits W.F. Clocksin 1985-05 13 p PDF (0.6 MB)
71 Executing temporal logic programs Ben Moszkowski 1985-08 96 p
70 A remote procedure call system Kenneth Graham Hamilton 1984-12 PhD
109 p
PDF (6.2 MB)
69 Proving termination of normalization functions for conditional expressions Lawrence C. Paulson 1985-06 16 p PDF (0.1 MB)
DVI (0.0 MB)
68 HOL : A machine oriented formulation of higher order logic Mike Gordon 1985-07 52 p PDF (1.6 MB)
67 Natural deduction theorem proving via higher-order resolution Lawrence C. Paulson 1985-05 22 p PDF (0.9 MB)
66 A formal hardware verification methodology and its application to a network interface chip M.J.C. Gordon, J. Herbert 1985-05 39 p PDF (1.2 MB)
65 Introduction to the programming language “Ponder” Mark Tillotson 1985-05 57 p
64 A framework for inference in natural language front ends to databases Branimir K. Boguraev, Karen Spärck Jones 1985-02 73 p
63 Poly manual David C.J. Matthews 1985-02 46 p PDF (1.4 MB)
62 Constraint enforcement in a relational database management system Michael Robson (1984) PhD
106 p
PDF (6.2 MB)
61 User models and expert systems Karen Spärck Jones 1984-12 44 p PDF (2.2 MB)
60 Memory and context mechanisms for automatic text processing Hiyan Alshawi (1984) PhD
192 p
PDF (11.9 MB)
59 On the composition and decomposition of assertions Glynn Winskel 1984-11 35 p PDF (1.1 MB)
58 Categories of models for concurrency Glynn Winskel 1984-10 35 p PDF (1.3 MB)
57 Constructing recursion operators in intuitionistic type theory Lawrence C. Paulson 1984-10 46 p PDF (0.3 MB)
DVI (0.1 MB)
56 A new scheme for writing functional operating systems William Stoye 1984-09 30 p PDF (2.5 MB)
55 Executing temporal logic programs Ben Moszkowski 1984-08 27 p PDF (1.8 MB)
54 Lessons learned from LCF Lawrence Paulson 1984-08 16 p PDF (1.3 MB)
53 A new type-checker for a functional language Jon Fairbairn 1984-07 16 p PDF (1.2 MB)
52 The design of a ring communication network Steven Temple (1984) PhD
132 p
PDF (6.3 MB)
51 Using information systems to solve recursive domain equations effectively Glynn Winskel, Kim Guldstrand Larsen 1984-07 41 p PDF (2.9 MB)
50 Verifying the unification algorithm in LCF Lawrence Paulson 1984-03 28 p PDF (0.2 MB)
DVI (0.0 MB)
49 Programming language design with polymorphism David Charles James Matthews (1983) PhD
143 p
PDF (6.6 MB)
48 A mechanism for the accumulation and application of context in text processing Hiyan Alshawi 1983-11 17 p PDF (0.8 MB)
47 Automatic summarising of English texts John Irving Tait (1982) PhD
137 p
PDF (8.0 MB)
46 Intelligent network interfaces Nicholas Henry Garnett 1985-05 PhD
140 p
PDF (8.7 MB)
45 Compound noun interpretation problems Karen Spärck Jones 1983-07 16 p PDF (1.2 MB)
44 Structural induction in LCF Lawrence Paulson 1983-11 35 p PDF (1.8 MB)
43 Extending the local area network Ian Malcom Leslie 1983-02 PhD
71 p
PDF (2.9 MB)
42 Proving a computer correct with the LCF_LSM hardware verification system Mike Gordon 1983-09 49 p PDF (2.1 MB)
41 LCF_LSM, A system for specifying and verifying hardware Mike Gordon 1983-09 53 p PDF (2.5 MB)
40 The SKIM microprogrammer’s guide W. Stoye 1983-10 33 p PDF (1.8 MB)
39 Tactics and tacticals in Cambridge LCF Lawrence Paulson 1983-07 26 p PDF (0.9 MB)
38 Views and imprecise information in databases Mike Gray 1982-11 PhD
119 p
PDF (5.0 MB)
37 Representation and authentication on computer networks Christopher Gray Girling (1983) PhD
154 p
PDF (8.4 MB)
36 The revised logic PPLAMBDA : A reference manual Lawrence Paulson 1983-03 28 p PDF (0.7 MB)
35 Rewriting in Cambridge LCF Larry Paulson 1983-02 32 p DVI (0.0 MB)
34 Recent developments in LCF: examples of structural induction Larry Paulson 1983-01 15 p PDF (0.7 MB)
33 An island parsing interpreter for Augmented Transition Networks John A. Carroll 1982-10 50 p PDF (1.9 MB)
32 How to drive a database front end using general semantic information B.K. Boguraev, K. Spärck Jones 1982-11 20 p PDF (1.3 MB)
31 Ponder and its type system J. Fairbairn 1982-11 42 p PDF (1.4 MB)
30 A portable BCPL library John Wilkes 1982-10 31 p PDF (2.2 MB)
29 Introduction to Poly D.C.J. Matthews 1982-05 24 p PDF (1.0 MB)
28 Poly report D.C.J. Matthews 1982-08 17 p PDF (0.8 MB)
27 Exception handling in domain based systems Martyn Alan Johnson 1981-09 PhD
129 p
PDF (6.5 MB)
26 Portable system software for personal computers on a network Brian James Knight (1982) PhD
204 p
PDF (9.8 MB)
25 A clustering technique for semantic network processing Hiyan Alshawi 1982-05 9 p PDF (0.6 MB)
24 Steps towards natural language to data language translation using general semantic information B.K. Boguraev, K. Spärck Jones 1982-03 8 p PDF (0.5 MB)
23 Two papers about the scrabble summarising system J.I. Tait (1982) 12 p PDF (0.7 MB)
22 Constraints in CODD M. Robson (1982) 18 p PDF (1.1 MB)
21 The correctness of a precedence parsing algorithm in LCF A. Cohn 1982-04 38 p PDF (1.8 MB)
20 On using Edinburgh LCF to prove the correctness of a parsing algorithm Avra Cohn, Robin Milner 1982-02 23 p PDF (1.2 MB)
19 Analysis and inference for English Arthur William Sebright Cater 1981-09 PhD
223 p
PDF (17.7 MB)
18 Automatic mesh generation of 2 & 3 dimensional curvilinear manifolds Burkard Wördenweber 1981-11 PhD
128 p
17 Three papers on parsing B.K. Boguraev, K. Spärck Jones, J.I. Tait 1982 22 p PDF (1.3 MB)
16 Reliable storage in a local network Jeremy Dion 1981-02 PhD
142 p
PDF (1.8 MB)
15 The implementation of BCPL on a Z80 based microcomputer I.D. Wilson (1980) BA
68 p
PDF (2.4 MB)
14 Store to store swapping for TSO under OS/MVT J.S. Powers 1980-06 28 p PDF (1.9 MB)
13 Resource allocation and job scheduling Philip Hazel 1980 41 p PDF (2.0 MB)
12 HASP “IBM 1130” multileaving remote job entry protocol with extensions as used on the University of Cambridge IBM 370/165 M.R.A. Oakley, P. Hazel 1979-09 28 p PDF (1.6 MB)
11 Automatic resolution of linguistic ambiguities Branimir Konstatinov Boguraev (1979) PhD
222 p
PDF (10.9 MB)
10 Prediction oriented description of database systems Mark Theodore Pezarro (1978) PhD
190 p
PDF (8.8 MB)
9 Evaluation of a protection system Douglas John Cook (1978) PhD
181 p
PDF (7.1 MB)
7 Local area computer communication networks Andrew Hopper 1978-04 PhD
192 p
PDF (1.9 MB)
6 System programming in a high level language Andrew D. Birrell 1977-12 PhD
125 p
PDF (7.0 MB)
5 Parrot – A replacement for TCAM P. Hazel, A.J.M. Stoneley 1976-04 25 p PDF (1.2 MB)
4 The dynamic creation of I/O paths under OS/360-MVT A.J.M. Stoneley 1975-04 16 p PDF (0.9 MB)
3 A replacement for the OS/360 disc space management routines A.J.M. Stoneley 1975-04 7 p PDF (0.6 MB)
2 Scheduling for a share of the machine J. Larmouth 1974-10 29 p PDF (1.4 MB)
1 The JACKDAW database package M.F. Challis 1974-10 15 p PDF (0.8 MB)